>
Fa   |   Ar   |   En
   attribute-based remote data auditing and user authentication for cloud storage systems  
   
نویسنده ali mohammad
منبع the isc international journal of information security - 2022 - دوره : 14 - شماره : 3 - صفحه:43 -49
چکیده    Remote data auditing (rda) protocols enable a cloud server to persuade an auditor that it is storing a data file honestly. unlike digital signature(ds) schemes, in rda protocols, the auditor can carry out the auditing procedure without having the entire data file. therefore, rda protocols seem to be attractive alternatives to dss as they can effectively reduce bandwidth consumption. however, existing rda protocols do not provide adequately powerful tools for user authentication. in this paper, we put forward a novel attribute-based remote data auditing and user authentication scheme. in our proposed scheme, without having a data file outsourced to a cloud server, an auditor can check its integrity and the issuer’s authenticity. indeed, through a challenge-response protocol, the auditor can check whether 1) the cloud server has changed the content of the data file or not; 2) the data owner possesses specific attributes or not. we show that our scheme is secure under the hardness assumption of the bilinear diffie-hellman (bdh) problem.
کلیدواژه cloud computing ,data integrity ,attribute-based authentication ,data auditing ,attribute-based cryptography
آدرس amirkabir university of technology, department of mathematics and computer science, iran
پست الکترونیکی mali71@aut.ac.ir
 
     
   
Authors
  
 
 

Copyright 2023
Islamic World Science Citation Center
All Rights Reserved