Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (5): 132-141.doi: 10.19665/j.issn1001-2400.20230107

• Cyberspace Security • Previous Articles     Next Articles

Improved short-signature based cloud data audit scheme

CUI Yuanyou1,2(),WANG Xu’an1(),LANG Xun3(),TU Zheng1(),SU Yunxuan1()   

  1. 1. College of Cryptographic Engineering,Engineering University of PAP,Xi’an 710000,China
    2. Anhui Corps of PAP,Hefei 230000,China
    3. Guizhou Corps of PAP,Guiyang 550000,China
  • Received:2022-11-02 Online:2023-10-20 Published:2023-11-21
  • Contact: Xu’an WANG E-mail:jshmcuiyuanyou@163.com;wangxazjd@163.com;langapf@163.com;tutu_2248@163.com;2633389084@qq.com

Abstract:

With the development of the Internet of Things,Cloud storage has experienced an explosive growth.Effective verification of the integrity of data stored on the Cloud storage service providers(CSP) has become an important issue.In order to solve the problem that the existing data integrity audit scheme based on the BLS short signature is inefficient,ZHU et al.designed a data integrity audit scheme based on the ZSS short signature in 2019.However,this paper points out that the proof generated by ZHU et al.'s scheme in the challenge phase is incorrect and can be subjected to replay attacks or attacked by using a bilinear map,so as to pass the audit of a third party auditor(TPA).Then,this paper proposes an improved cloud audit scheme based on the short signature by improving the calculation method of proof in the challenge stage and optimizing the equations used by the third party auditor in the verification stage for verifying proof.This paper proves the correctness of the improved scheme,compensates for the shortcomings in the original scheme,and analyzes the security of the scheme.The improved scheme not only can make attackers including the third party auditor unable to recover users’ data,but also can resist replay attacks and forgery attacks of attackers including malicious cloud storage service providers.Through numerical analysis,it is found that the computational cost did not change much,and that the communication cost decreased,thus providing a better computational accuracy than the original scheme.

Key words: short signature, cloud storage, cloud security, data possession proof

CLC Number: 

  • TP309.7