Identity-based controlled delegated outsourcing data integrity auditing scheme

Jianming Du,Guofang Dong,Juangui Ning,Zhengnan Xu,Ruicheng Yang
DOI: https://doi.org/10.1038/s41598-024-58325-y
IF: 4.6
2024-03-31
Scientific Reports
Abstract:With the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes. Still, most need help with outsourced data integrity, controlled outsourcing, and source file auditing. Therefore, we propose a controlled delegation outsourcing data integrity auditing scheme based on the identity-based encryption model. Our proposed scheme allows users to specify a dedicated agent to assist in uploading data to the cloud. These authorized proxies use recognizable identities for authentication and authorization, thus avoiding the need for cumbersome certificate management in a secure distributed computing system. While solving the above problems, our scheme adopts a bucket-based red–black tree structure to efficiently realize the dynamic updating of data, which can complete the updating of data and rebalancing of structural updates constantly and realize the high efficiency of data operations. We define the security model of the scheme in detail and prove the scheme's security under the difficult problem assumption. In the performance analysis section, the proposed scheme is analyzed experimentally in comparison with other schemes, and the results show that the proposed scheme is efficient and secure.
multidisciplinary sciences
What problem does this paper attempt to address?
### Problems Addressed by the Paper The paper aims to address several key issues related to data integrity and privacy protection in cloud storage: 1. **Outsourced Data Integrity**: When users store data in the cloud, it is essential to ensure that the data remains intact and unaltered during storage and retrieval. Existing solutions typically rely on cryptographic techniques such as hash functions or digital signatures to verify data integrity, but these methods may still be vulnerable to attacks or manipulation by malicious cloud service providers or unauthorized users. 2. **Controlled Outsourcing**: Users may wish to delegate specific tasks (such as uploading data) to dedicated agents or agencies. However, existing schemes often lack effective mechanisms to manage and control these delegated operations, which can lead to security risks, such as unauthorized or malicious agents accessing sensitive data or performing unauthorized actions on behalf of the user. 3. **Source File Auditing**: Users need to ensure that the data uploaded to the cloud is consistent with the original source files and that the cloud storage service accurately reflects any updates or modifications made to the data. Existing solutions may not provide robust mechanisms to audit the integrity of source files, potentially leading to inconsistencies or discrepancies between local copies and cloud-stored data. 4. **Dynamic Updates**: Data stored remotely can be accessed and updated by the user, including operations such as data modification, deletion, and insertion. To ensure that data is updated in a timely manner and that users can obtain real-time update information from the cloud server to accurately monitor data dynamics, efficient data update operations are required. ### Solution To address the above issues, the authors propose an Identity-based Controlled Delegated Outsourcing Data Integrity Auditing Scheme. The main contributions of this scheme include: 1. **Identity-based Controlled Delegation Mechanism**: Authorized agents can securely outsource data to untrusted cloud service providers, while unauthorized agents cannot outsource user data. This identity-based delegation mechanism can be extended to multi-user environments. 2. **Effective Verification of Outsourced Document Integrity**: Including the source, type, and other information of the documents. 3. **Efficient Bucket-based Red-Black Tree (B-RBT) Data Structure**: Used to support dynamic operations on user data, allowing data updates and structure rebalancing to be completed in constant time, achieving efficient data update operations. 4. **Security Proof**: The proposed scheme's correctness and security are demonstrated through specific security analysis, and experimental simulations comparing it with other schemes show that the proposed scheme is secure and efficient. ### Summary By proposing an Identity-based Controlled Delegated Outsourcing Data Integrity Auditing Scheme, the paper addresses issues related to data integrity, controlled outsourcing, source file auditing, and dynamic updates in cloud storage, providing a more secure and efficient method for cloud data auditing.