z-logo
Premium
Efficient audit protocol supporting virtual nodes in cloud storage
Author(s) -
Hou Gaopan,
Ma Jianfeng,
Liang Chen,
Li Jiayi
Publication year - 2021
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.3911
Subject(s) - cloud computing , computer science , cloud storage , outsourcing , audit , service provider , computer security , cloud computing security , protocol (science) , service (business) , database , computer network , operating system , business , accounting , medicine , alternative medicine , pathology , marketing
With ten years of development, cloud computing has been widely used in more and more field. As a part of cloud computing, cloud storage has earned more and more attentions. It becomes a new trend that users employ cloud storage to outsource their data. Instead of the traditional approach to store data in a local server, users' data cannot be controlled once data outsourcing in cloud storage. At the same time, as the cloud service provider is honest‐but‐curious, it becomes a challenge to make sure that cloud service provider can provide storage service with high quantity. In this paper, we focus on the issue of cloud storage security audit. In particular, we propose a novel public audit scheme, which employs chameleon authentication tree in the third‐party audit model to significantly reduce the huge computation cost of data dynamic operation. Meanwhile, our scheme can effectively prevent the fraud of dishonest cloud service provider, with supporting dynamic data update and batch audit. The experimental results show that the proposed scheme is more secure and efficient compared with the existing schemes.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here