An improved lattice based certificateless data integrity verification techniques for cloud computing

J. Ambient Intell. Humaniz. Comput.(2023)

引用 0|浏览0
暂无评分
摘要
Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be overlooked in present advancement. As a result of the difficulty involved in verifying and enforcing digital signatures, classic public-key approaches are vulnerable to security threats. Numerous assaults on cloud-based vital services such as search engines, storage systems, and crucial applications ranging from healthcare to defense have recently been reported in the literature due to advances in quantum computing. A collection of post-quantum cryptography primitives is being created to assist users in deciding which to utilize to overcome the present migration. This paper reviews the work done by Yongqiang Zhang et al. and Yang et al. Crypto Scheme. Using our technique, users may generate a Lattice-based public key without offering a Certificate-based method for Data Integrity Verification, as proposed in this study. It has the additional benefit of lowering the cost of the signature algorithm. This paper presents various Post-Quantum security attacks based on the AVISPA tool and Vulnerability attacks of existing security. We demonstrate that our technique is probably safe for usage in the random oracle model using this way. As an additional benefit, it is more secure than past alternatives. After demonstrating the effectiveness of our approach in the random oracle model, we tested its safety by examining the recent techniques. The various cryptographic protocols from literature surveys do not entirely cover the complete security attacks. This paper cryptanalyzes these cryptographic protocols with Cloud data integrity verification techniques and also provides a Proposed Lattice based Certificateless Data Integrity Verification Model for Cloud Computing (CDIVM), using AVISPA (Automated Validation of Internet Security Protocol and Applications Tool) and BAN logic.
更多
查看译文
关键词
Cloud computing,Data integrity,Cryptanalysis,Lattice based crypto system,Cloud storage,Privacy preserving,Attribute-based encryption,Identity-based cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要