IEEE Access (Jan 2023)

ZSS Signature-Based Audit Message Verification Process for Cloud Data Integrity

  • Paromita Goswami,
  • Neetu Faujdar,
  • Somen Debnath,
  • Ajoy Kumar Khan,
  • Ghanshyam Singh

DOI
https://doi.org/10.1109/ACCESS.2023.3343841
Journal volume & issue
Vol. 11
pp. 145485 – 145502

Abstract

Read online

Online cloud data storage, a pillar of the IT industry, offers data owners a plethora of attractive developments in highly sought-after online scalable storage services for them to willing new inventive and investment business profit. Today, most cloud data security research focuses on improving the accuracy of outsourced data audits rather than paying attention to internal and external enemies who could hack a cloud server. Even though the data owner enviously envies the data auditing job of stored data to a trusted Third Party Auditor (TPA) to save communication as well as the computational overhead of data which outsourcing to a reputable Cloud Service Provider (CSP), TPA is unreliable in a realistic context. A TPA or a CSP may occasionally be a malicious attacker or be under the sway of other hostile attackers. As a result, either the message of the audit result might be faked or TPA may produce a phony audit message without carrying out any data verification work, in which case CSP would be in for a fight. Instead of establishing a secure communication route between all parties, a progressive technique is therefore required to thwart enemies’ attempts to collaborate with data owners who have outsourced their data. In this paper, we propose a model for an effective data integrity and audit message verification system based on the ZSS (Zhang, Safavi, and Susilo) signature, which protects data privacy in cloud storage and uses faked data recovery to pay back original data using a modular approach. We also consider our proposed model for a existing Blockchain-based Medical system that helps a patient party to check the intactness of their medical record in shared cloud storage via a third-party auditor. Finally, the experimental results of the performance of the proposed prototype of the system model have been measured and illustrated better efficiency of the proposed model with the comparison of the existing auditing model.

Keywords