Scientific Reports (Mar 2024)

Identity-based controlled delegated outsourcing data integrity auditing scheme

  • Jianming Du,
  • Guofang Dong,
  • Juangui Ning,
  • Zhengnan Xu,
  • Ruicheng Yang

DOI
https://doi.org/10.1038/s41598-024-58325-y
Journal volume & issue
Vol. 14, no. 1
pp. 1 – 21

Abstract

Read online

Abstract With the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes. Still, most need help with outsourced data integrity, controlled outsourcing, and source file auditing. Therefore, we propose a controlled delegation outsourcing data integrity auditing scheme based on the identity-based encryption model. Our proposed scheme allows users to specify a dedicated agent to assist in uploading data to the cloud. These authorized proxies use recognizable identities for authentication and authorization, thus avoiding the need for cumbersome certificate management in a secure distributed computing system. While solving the above problems, our scheme adopts a bucket-based red–black tree structure to efficiently realize the dynamic updating of data, which can complete the updating of data and rebalancing of structural updates constantly and realize the high efficiency of data operations. We define the security model of the scheme in detail and prove the scheme's security under the difficult problem assumption. In the performance analysis section, the proposed scheme is analyzed experimentally in comparison with other schemes, and the results show that the proposed scheme is efficient and secure.

Keywords