{"title":"改进了基于身份的面向代理的外包,并为安全云存储提供了公共审计","authors":"Cui Yuanyou, Su Yunxuan, Tu Zheng, Zhang Jindan","doi":"10.1504/ijguc.2023.133415","DOIUrl":null,"url":null,"abstract":"With the advent of cloud computing, it is an important problem to verify the integrity of data stored on cloud service providers by proxy while ensuring proxy's credibility. In 2019, Zhang proposed an identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems that outsourced medical data to cloud storage. Meanwhile the proxy is added for improving the speed of data processing. Unfortunately, some flaws are found in their approach in this paper. The signature generated by the agent can be forged to modify the original data. We have made some improvements based on the original protocol to improve the shortcomings of the original scheme. Finally, the security analysis shows that the security of the new protocol is enhanced.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"2013 1","pages":"0"},"PeriodicalIF":0.5000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage\",\"authors\":\"Cui Yuanyou, Su Yunxuan, Tu Zheng, Zhang Jindan\",\"doi\":\"10.1504/ijguc.2023.133415\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advent of cloud computing, it is an important problem to verify the integrity of data stored on cloud service providers by proxy while ensuring proxy's credibility. In 2019, Zhang proposed an identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems that outsourced medical data to cloud storage. Meanwhile the proxy is added for improving the speed of data processing. Unfortunately, some flaws are found in their approach in this paper. The signature generated by the agent can be forged to modify the original data. We have made some improvements based on the original protocol to improve the shortcomings of the original scheme. Finally, the security analysis shows that the security of the new protocol is enhanced.\",\"PeriodicalId\":44878,\"journal\":{\"name\":\"International Journal of Grid and Utility Computing\",\"volume\":\"2013 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.5000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Grid and Utility Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijguc.2023.133415\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Grid and Utility Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijguc.2023.133415","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage
With the advent of cloud computing, it is an important problem to verify the integrity of data stored on cloud service providers by proxy while ensuring proxy's credibility. In 2019, Zhang proposed an identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber-physical systems that outsourced medical data to cloud storage. Meanwhile the proxy is added for improving the speed of data processing. Unfortunately, some flaws are found in their approach in this paper. The signature generated by the agent can be forged to modify the original data. We have made some improvements based on the original protocol to improve the shortcomings of the original scheme. Finally, the security analysis shows that the security of the new protocol is enhanced.