Loading…

A secure and efficient public auditing system of cloud storage based on BLS signature and automatic blocker protocol

Cloud computing is a model that enables users to store their data remotely and enjoy the applications and services provided by this model on demand through a common set of configurable computing resources, without the burden of local data storage as well as maintenance. However, users no longer have...

Full description

Saved in:
Bibliographic Details
Published in:Journal of King Saud University. Computer and information sciences 2022-07, Vol.34 (7), p.4008-4021
Main Authors: Jalil, Baidaa Abdulrahman, Hasan, Taha Mohammed, Mahmood, Ghassan Sabeeh, Noman Abed, Hazim
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cloud computing is a model that enables users to store their data remotely and enjoy the applications and services provided by this model on demand through a common set of configurable computing resources, without the burden of local data storage as well as maintenance. However, users no longer have physical possession of external data, and this makes the task of protecting data integrity in cloud computing extremely important so that users can use the cloud storage as if it were local, without worrying about the need to verify its integrity. Hence, public cloud storage auditing is critical, so users can use a Third-party auditor (TPA) to verify data integrity. In order to provide effective TPA security, the audit should not achieves any security vulnerabilities to the privacy of user data and does not provide any additional online burden to the user. In this paper, we propose an effective public auditing system for cloud data based on the signature of Boneh-Lynn-Shacham (BLS), in order to ensure public auditing and maintain data privacy. The proposed system also realizes batch auditing and data dynamic process. In addition, the proposed system enhances the level of security authentication through an Automatic Blocker Protocol (ABP) to protect the system from unauthorized TPA. An extensive security and performance analysis shows that the proposed system is very secure and effective
ISSN:1319-1578
2213-1248
DOI:10.1016/j.jksuci.2021.04.001