With the rapid development of cloud service, people with limited storage space can store their data files to the cloud and delete\nthe file in their memory. However, the cloud service provider may change or partly delete userâ??s file for his benefit. Therefore, it\nis necessary for the user to periodically check the data file integrity. Public auditing protocols are just designated for checking the\ndata file integrity by an auditor on behalf of the user. Recently, based on ID-based cryptography many ID-based public auditing\nprotocols for cloud data integrity checking are proposed. However, some existing protocols are subjected to forgery attack. Other\nexisting protocols cannot preserve the privacy of the user, as the auditor can obtain userâ??s file content through times of auditing the\nsame file blocks. In this paper, we propose a newID-based public auditing protocol for cloud data integrity checkingwith optimized\nstructure, privacy-preserving, and effective aggregation verification. We also prove that the proposed protocol can resist forgery\nattack under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare our protocol with other ID-based\nauditing protocols.
Loading....