Citation: | YANG Xiaodong, WANG Xiuxiu, LI Xixi, ZHOU Hang, WANG Caifen. Decentralized Integrity Auditing Scheme for Cloud Data Based on Blockchain and Edge Computing[J]. Journal of Electronics & Information Technology, 2023, 45(10): 3759-3766. doi: 10.11999/JEIT210717 |
[1] |
ZHOU Lei, FU Anmin, YANG Guomin, et al. Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2): 1118–1132. doi: 10.1109/TDSC.2020.3013927
|
[2] |
鲁金钿, 肖睿智, 金舒原. 云数据安全研究进展[J]. 电子与信息学报, 2021, 43(4): 881–891. doi: 10.11999/JEIT200158
LU Jindian, XIAO Ruizhi, and JIN Shuyuan. A survey for cloud data security[J]. Journal of Electronics &Information Technology, 2021, 43(4): 881–891. doi: 10.11999/JEIT200158
|
[3] |
WANG Tao, YANG Bo, LIU Hongyu, et al. An alternative approach to public cloud data auditing supporting data dynamics[J]. Soft Computing, 2019, 23(13): 4939–4953. doi: 10.1007/s00500-018-3155-4
|
[4] |
ZHAO Haichun, YAO Xuanxia, ZHENG Xuefeng, et al. User stateless privacy-preserving TPA auditing scheme for cloud storage[J]. Journal of Network and Computer Applications, 2019, 129: 62–70. doi: 10.1016/j.jnca.2019.01.005
|
[5] |
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]. The 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 2007: 598–609.
|
[6] |
BOWERS K D, JUELS A, and OPREA A. Proofs of retrievability: Theory and implementation[C]. The 2009 ACM Workshop on Cloud Computing Security, Chicago, USA, 2009: 43–54.
|
[7] |
张振超, 刘亚丽, 殷新春, 等. 无证书签名方案的分析及改进[J]. 密码学报, 2020, 7(3): 389–403. doi: 10.13868/j.cnki.jcr.000375
ZHANG Zhenchao, LIU Yali, YIN Xinchun, et al. Analysis and improvement of certificateless signature schemes[J]. Journal of Cryptologic Research, 2020, 7(3): 389–403. doi: 10.13868/j.cnki.jcr.000375
|
[8] |
魏松杰, 李莎莎, 王佳贺. 基于身份密码系统和区块链的跨域认证协议[J]. 计算机学报, 2021, 44(5): 908–920. doi: 10.11897/SP.J.1016.2021.00908
WEI Songjie, LI Shasha, and WANG Jiahe. A cross-domain authentication protocol by identity-based cryptography on consortium blockchain[J]. Chinese Journal of Computer, 2021, 44(5): 908–920. doi: 10.11897/SP.J.1016.2021.00908
|
[9] |
赵艳琦, 来齐齐, 禹勇, 等. 标准模型下基于身份的环签名方案[J]. 电子学报, 2018, 46(4): 1019–1024. doi: 10.3969/j.issn.0372-2112.2018.04.033
ZHAO Yanqi, LAI Qiqi, YU Yong, et al. ID-based ring signature in the standard model[J]. Acta Electronica Sinica, 2018, 46(4): 1019–1024. doi: 10.3969/j.issn.0372-2112.2018.04.033
|
[10] |
ZHANG Xiaojun, WANG Huaxiong, and XU Chunxiang. Identity-based key-exposure resilient cloud storage public auditing scheme from lattices[J]. Information Sciences, 2019, 472: 223–234. doi: 10.1016/j.ins.2018.09.013
|
[11] |
WU Ge, MU Yi, SUSILO W, et al. Privacy-preserving certificateless cloud auditing with multiple users[J]. Wireless Personal Communications, 2019, 106(3): 1161–1182. doi: 10.1007/s11277-019-06208-1
|
[12] |
曾萍, 郭瑞芳, 马英杰, 等. 车载自组网中可证明安全的无证书认证方案[J]. 电子与信息学报, 2020, 42(12): 2873–2881. doi: 10.11999/JEIT190883
ZENG Ping, GUO Ruifang, MA Yingjie, et al. Provable security certificateless authentication scheme for vehicular ad hoc network[J]. Journal of Electronics &Information Technology, 2020, 42(12): 2873–2881. doi: 10.11999/JEIT190883
|
[13] |
谢永, 李香, 张松松, 等. 一种可证安全的车联网无证书聚合签名改进方案[J]. 电子与信息学报, 2020, 42(5): 1125–1131. doi: 10.11999/JEIT190184
XIE Yong, LI Xiang, ZHANG Songsong, et al. An improved provable secure certificateless aggregation signature scheme for vehicular ad hoc NETworks[J]. Journal of Electronics &Information Technology, 2020, 42(5): 1125–1131. doi: 10.11999/JEIT190184
|
[14] |
ZHANG Yuan, XU Chunxiang, LIN Xiaodong, et al. Blockchain-based public integrity verification for cloud storage against procrastinating auditors[J]. IEEE Transactions on Cloud Computing, 2021, 9(3): 923–937. doi: 10.1109/TCC.2019.2908400
|
[15] |
WANG Hao, QIN Hong, ZHAO Minghao, et al. Blockchain-based fair payment smart contract for public cloud storage auditing[J]. Information Sciences, 2020, 519: 348–362. doi: 10.1016/j.ins.2020.01.051
|
[16] |
LI Jiguo, YAN Hao, and ZHANG Yichen. Certificateless public integrity checking of group shared data on cloud storage[J]. IEEE Transactions on Services Computing, 2021, 14(1): 71–81. doi: 10.1109/TSC.2018.2789893
|
[17] |
NGUYEN L. Accumulators from bilinear pairings and applications[C]. Cryptographers' Track at the RSA Conference, San Francisco, USA, 2005: 275–292.
|
[18] |
NAIR M S and RAJASREE M S. Fine-grained search and access control in multi-user searchable encryption without shared keys[J]. Journal of Information Security and Applications, 2018, 41: 124–133. doi: 10.1016/j.jisa.2018.06.006
|
[19] |
FENG Xia, SHI Qichen, XIE Qingqing, et al. An efficient privacy-preserving authentication model based on blockchain for VANETs[J]. Journal of Systems Architecture, 2021, 117: 102158. doi: 10.1016/j.sysarc.2021.102158
|
[20] |
TIAN Hui, NAN Fulin, CHANG C C, et al. Privacy-preserving public auditing for secure data storage in fog-to-cloud computing[J]. Journal of Network and Computer Applications, 2019, 127: 59–69. doi: 10.1016/j.jnca.2018.12.004
|
[21] |
LI Hui and JING Tao. A lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks[J]. Wireless Communications and Mobile Computing, 2019, 2019: 1019767. doi: 10.1155/2019/1019767
|
[22] |
LI Hui and JING Tao. A ciphertext-policy attribute-based encryption scheme with public verification for an IoT-fog-cloud architecture[J]. Procedia Computer Science, 2020, 174: 243–251. doi: 10.1016/j.procs.2020.06.080
|