• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Lei, Chen Zhenzhu, Fu Anmin, Su Mang, Yu Yan. Cloud Secure Auditing Scheme Supporting Key Update and Auditor Replacement[J]. Journal of Computer Research and Development, 2022, 59(10): 2247-2260. DOI: 10.7544/issn1000-1239.20220529
Citation: Zhou Lei, Chen Zhenzhu, Fu Anmin, Su Mang, Yu Yan. Cloud Secure Auditing Scheme Supporting Key Update and Auditor Replacement[J]. Journal of Computer Research and Development, 2022, 59(10): 2247-2260. DOI: 10.7544/issn1000-1239.20220529

Cloud Secure Auditing Scheme Supporting Key Update and Auditor Replacement

Funds: This work was supported by the National Natural Science Foundation of China (62072239), the Jiangsu Natural Science Foundation of China (BK20211192), the Project of Guangxi Key Laboratory of Trusted Software (KX202029), and the Fundamental Research Funds for the Central Universities (30921013111, 30920021129).
More Information
  • Published Date: September 30, 2022
  • Cloud storage provides data hosting services, which solves the issue of local data management and sharing restrictions. Existing audit methods used for securing the cloud data usually have a serious security flaw: if the signature key is revealed, the audit proposal that relies on the key to produce signatures would no longer guarantee the data integrity. In addition, most audit schemes assume that there is only one fixed auditor throughout the auditing process. However, due to being compromised, bribed, or lacking resources, the auditor may not be able to perform audit agency services anymore. Therefore, we propose a cloud secure auditing scheme supporting key update and auditor replacement, named AKUAR. In the model, AKUAR utilizes bilinear pairs and proxy re-signature idea to develop an efficient key and tag update mechanism, wherein the cloud server undertakes the computationally intensive tag update operations and only a little amount of cost is incurred in the local side. In addition, when the fog node acting as the auditor terminates the audit, the new fog node can carry on the integrity audit in its place, realizing the sustainability of the audit service and preventing disclosure of the new signature key to the old fog node. Finally, security analysis demonstrates that AKUAR is provably secure, and performance evaluations also confirm that AKUAR only introduces a modest amount of acceptable computational and communication costs during the tag generation and key update phases.
  • Related Articles

    [1]Wang Zirui, Jiang Dejun. Key Techniques of Swapping Mechanism Based on Ultra-Low Latency SSD[J]. Journal of Computer Research and Development, 2024, 61(3): 557-570. DOI: 10.7544/issn1000-1239.202330538
    [2]Wu Xian, Tang Hongbo, Zhao Yu, Xu Mingyan. A Cross-Cluster Real-Time Migration Method for Stateful Container[J]. Journal of Computer Research and Development, 2024, 61(2): 494-502. DOI: 10.7544/issn1000-1239.202220602
    [3]Wang Zihan, Zhang Jiao, Zhang Yuan, Pan Tian, Huang Tao. A Transport Control Protocol for Low Earth Orbit Satellite Networks Based on Link Information Estimation[J]. Journal of Computer Research and Development, 2023, 60(8): 1846-1857. DOI: 10.7544/issn1000-1239.202220299
    [4]Fu Wenwen, Liu Rulin, Quan Wei, Jiang Xuyan, Sun Zhigang. nPSA:A Low-Latency, Deterministic Switching Architecture for TSN Chips[J]. Journal of Computer Research and Development, 2023, 60(6): 1322-1336. DOI: 10.7544/issn1000-1239.202111205
    [5]Fan Zhihua, Wu Xinxin, Li Wenming, Cao Huawei, An Xuejun, Ye Xiaochun, Fan Dongrui. Dataflow Architecture Optimization for Low-Precision Neural Networks[J]. Journal of Computer Research and Development, 2023, 60(1): 43-58. DOI: 10.7544/issn1000-1239.202111275
    [6]Liao Xiaojian, Yang Zhe, Yang Hongzhang, Tu Yaofeng, Shu Jiwu. A Low-Latency Storage Engine with Low CPU Overhead[J]. Journal of Computer Research and Development, 2022, 59(3): 489-498. DOI: 10.7544/issn1000-1239.20210574
    [7]Fu Yongquan, Li Dongsheng. Application Driven Network Latency Measurement Analysis and Optimization Techniques Edge Computing Environment: A Survey[J]. Journal of Computer Research and Development, 2018, 55(3): 512-523. DOI: 10.7544/issn1000-1239.2018.20170793
    [8]Gong Haigang, Yu Changyuan, Liu Ming, Yi Fasheng, Wang Xiaomin, Chen Lijun. A Self-Adaptive, Energy-Efficient Low Latency MAC Protocol for Wireless Sensor Network[J]. Journal of Computer Research and Development, 2007, 44(11): 1866-1872.
    [9]Li Yong, Wang Zhiying, Zhao Xuemi, and Yue Hong. Design of Application Specific Instruction-Set Processors Directed by Configuration Stream Driven Computing Architecture[J]. Journal of Computer Research and Development, 2007, 44(4): 714-721.
    [10]Zhang Yujun, Li Zhongcheng, Zheng Hongxia, Tian Ye, and Sun Jingbo. Transport Mechanism Applied to Computer Network Protocol Conformance Testing[J]. Journal of Computer Research and Development, 2005, 42(1): 102-108.
  • Cited by

    Periodical cited type(1)

    1. 郑章财,徐锋. 嵌入式服务器软件接口通信容量调节算法仿真. 计算机仿真. 2024(04): 265-269 .

    Other cited types(0)

Catalog

    Article views (143) PDF downloads (109) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return