Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit
Journal of King Saud University - Computer and Information Sciences, ISSN: 1319-1578, Vol: 34, Issue: 10, Page: 8079-8089
2022
- 7Citations
- 22Captures
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Article Description
In the cloud storage environment, scholars have proposed data integrity auditing schemes to ensure the integrity of data in the cloud. In some scenarios, users may need to designate an auditor to perform auditing tasks, however, most existing cloud auditing schemes are not applicable. A small number of cloud auditing schemes with designated verifiers use PKI cryptography and identity-based cryptography, which has complex certificate management and key escrow problems. Therefore, based on the certificateless signature algorithm of the specified verifier, we construct an efficient certificateless provable data possession mechanism in the cloud with a designated verifier called CL-DV-PDP. Based on of meeting the above user’s requirement, our scheme can also perform a batch audit of multi-user data at the same time. We use a dynamic hash table to dynamically update the cloud data and the scheme also supports privacy protection. We define the security model of the scheme in detail, and the security of the scheme is proved based on the CDH assumption under the random oracle model. In the efficiency analysis section, we compare the functions and computational costs of our scheme with the relevant references, the result shows that the functions of the scheme are comprehensive and our scheme is efficient.
Bibliographic Details
http://www.sciencedirect.com/science/article/pii/S1319157822002579; http://dx.doi.org/10.1016/j.jksuci.2022.07.020; http://www.scopus.com/inward/record.url?partnerID=HzOxMe3b&scp=85135512352&origin=inward; https://linkinghub.elsevier.com/retrieve/pii/S1319157822002579; https://dx.doi.org/10.1016/j.jksuci.2022.07.020
Springer Science and Business Media LLC
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know