1
|
Du J, Dong G, Ning J, Xu Z, Yang R. Identity-based controlled delegated outsourcing data integrity auditing scheme. Sci Rep 2024; 14:7582. [PMID: 38555378 DOI: 10.1038/s41598-024-58325-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/08/2024] [Accepted: 03/27/2024] [Indexed: 04/02/2024] Open
Abstract
With the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes. Still, most need help with outsourced data integrity, controlled outsourcing, and source file auditing. Therefore, we propose a controlled delegation outsourcing data integrity auditing scheme based on the identity-based encryption model. Our proposed scheme allows users to specify a dedicated agent to assist in uploading data to the cloud. These authorized proxies use recognizable identities for authentication and authorization, thus avoiding the need for cumbersome certificate management in a secure distributed computing system. While solving the above problems, our scheme adopts a bucket-based red-black tree structure to efficiently realize the dynamic updating of data, which can complete the updating of data and rebalancing of structural updates constantly and realize the high efficiency of data operations. We define the security model of the scheme in detail and prove the scheme's security under the difficult problem assumption. In the performance analysis section, the proposed scheme is analyzed experimentally in comparison with other schemes, and the results show that the proposed scheme is efficient and secure.
Collapse
Affiliation(s)
- Jianming Du
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| | - Guofang Dong
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China.
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China.
| | - Juangui Ning
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| | - Zhengnan Xu
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| | - Ruicheng Yang
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| |
Collapse
|