Computer Applications and Software, Volume. 42, Issue 4, 335(2025)

FLEXIBLE CLOUD AUDITING SCHEME WITH A DESIGNATED VERIFIER

Zhao Jutao1 and Chang Jinyong2,3
Author Affiliations
  • 1Department of Mathematics, Changzhi University, Changzhi 046011, Shanxi, China
  • 2School of Information and Control Engineering, Xi'an University of Architecture and Technology, Xi'an 710055, Shaanxi, China
  • 3The State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • show less
    References(15)

    [1] [1] Yu Y, Zhang Y F, Ni J B, et al. Remote data possession checking with enhanced security for cloud[J]. Future Generation Computer Systems, 2015, 52: 77-85.

    [2] [2] Schacham H, Waters B. Compact proofs of retrievability[J]. Journal of Cryptology, 2013, 26: 442-483.

    [3] [3] Chang J Y, Shao B L, Ji Y, et al. Efficient identity-based provable multi-copy data possession in multi-cloud storage, revisited[J]. IEEE Communications Letters, 2020, 24(12): 2723-2727.

    [4] [4] Xue J T, Xu C X, Zhao J N, et al. Identity-based public auditing for cloud storage systems against malicious auditors via blockchain[J]. Science China Information Sciences, 2019, 62: 32104.

    [5] [5] Zhang R, Ma H, Lu Y, et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead[J]. Science China Information Sciences, 2017, 60 (12): 122104.

    [6] [6] Ji Y, Shao B L, Chang J Y, Bian G Q. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited[J]. Applied Mathematics and Computation, 2020, 386: 125478.

    [7] [7] Tian H, Nan F L, Chang C, et al. Privacy-preserving public auditing for secure data storage in fog-to-cloud computing[J]. Journal of Network and Computer Applications, 2019, 127: 59-69.

    [8] [8] Zhang J, Yang Y, Chen Y J. A general framework to design secure cloud storage protocol using homomorphic encryption scheme[J]. Computer Networks, 2017, 129: 37-50.

    [9] [9] Gan Q, Wang X M, Fang X F. Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud[J]. Science China Information Sciences, 2018, 61(12): 122104.

    [10] [10] Li J G, Yan H, Zhang Y C. Efficient identity-based provable multi-copy data possession in multi-cloud storage[J]. IEEE Transactions on Cloud Computing, 2020, 10(1): 356-365.

    [11] [11] Ren Y J, Xu J, Wang J, et al. Designated-verifier provable data possession in public cloud storage[J]. International Journal of Security and its Applications, 2013, 7(6): 11-20.

    [12] [12] Wang H Q, He D B, Yu J, et al. Incentive and Unconditionally anonymous identity-based public provable data possession[J]. IEEE Transactions on Services Computing, 2019, 12(5): 824-835.

    [13] [13] Yan H, Li J G, Zhang Y C. Remote data checking with a designated verifier in cloud storage[J]. IEEE Systems Journal, 2020, 14(2): 1788-1797.

    [14] [14] Wang H Q, Wu Q H, Qin B. Identity-based remote data possession checking in public clouds[J]. IET Information Security, 2014, 8(2): 114-121.

    [15] [15] Chen F, Xiang T, Yang Y, et al. Secure cloud storage meets with secure network coding[J]. IEEE Transactions on Computers, 2016, 65(6): 1936-1948.

    Tools

    Get Citation

    Copy Citation Text

    Zhao Jutao, Chang Jinyong. FLEXIBLE CLOUD AUDITING SCHEME WITH A DESIGNATED VERIFIER[J]. Computer Applications and Software, 2025, 42(4): 335

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Oct. 28, 2021

    Accepted: Aug. 25, 2025

    Published Online: Aug. 25, 2025

    The Author Email:

    DOI:10.3969/j.issn.1000-386x.2025.04.047

    Topics