A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical.

Slides:



Advertisements
Similar presentations
E W H A W U New Nominative Proxy Signature Scheme for Mobile Communication April Seo, Seung-Hyun Dept. of Computer Science and.
Advertisements

Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 ) Date: 2004/05/26.
A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce Source: Journal of Computers, Vol.19, No.1, April 2008 Author: Chin-Ling Chen,
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
1 A practical off-line digital money system with partially blind signatures based on the discrete logarithm problem From: IEICE TRANS. FUNDAMENTALS, VOL.E83-A,No.1.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
Bob can sign a message using a digital signature generation algorithm
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid Haiyong Bao Nanyang Technological University June.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
1 A Secure System Based on Fingerprint Authentication Scheme Author : Zhe Wu,Jie Tian,Liang Li, Cai-ping Jiang,Xin Yang Prestented by Chia Jui Hsu.
Identity-Based Secure Distributed Data Storage Schemes.
Speaker: Meng-Ting Tsai Date:2011/04/26 Establishing Trust in Cloud Computing IEEE Computer Society.
Efficient Downloading and Updating Application on Smart Cards Yongsu Park, Junyoung Heo, Yookun Cho School of Computer Science and Engineering Seoul National.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
1 一個新的代理簽章法 A New Proxy Signature Scheme 作 者 : 洪國寶, 許琪慧, 郭淑娟與邱文怡 報 告者 : 郭淑娟.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
Prepared by Dr. Lamiaa Elshenawy
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Unpredictable Software-based Attestation Solution for Node Compromise Detection in Mobile WSN Xinyu Jin 1 Pasd Putthapipat 1 Deng Pan 1 Niki Pissinou 1.
Software-Defined Architecture for Mobile Clouds in Device-to-Device Communication Muhammad Usman; Anteneh A. Gebremariam; Fabrizio Granelli; Dzmitry Kliazovich.
29/Jul/2009 Young Hoon Park.  M.Bellare, D.Micciancio, B.Warinschi, Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and.
Sensors Journal, IEEE, Issue Date: May 2013,
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Outlines Overview (what is smart grid) Smart City (Test bed)
A new ring signature scheme with signer-admission property
A secure and traceable E-DRM system based on mobile device
Improving Lamport One-time Signature Scheme
Efficient CRT-Based RSA Cryptosystems
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Energy-Efficient Storage Systems
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
Presentation transcript:

A Double-Efficient Integrity Verification Scheme to Cloud Storage Data Deng Hongyao, Song Xiuli, Tao jingsong 2014 TELKOMNIKA Indonesian Journal of Electrical Engineering Presenter : 陳昱安 Date : 2014/10/6

Outline Introduction Schnorr Signature Scheme Safety Integrity Verification Scheme Based on Schnorr Signature Efficient Integrity Verification Scheme Based on Schnorr Signature Security and Performance Analysis Conclusion 2

Outline Introduction Schnorr Signature Scheme Safety Integrity Verification Scheme Based on Schnorr Signature Efficient Integrity Verification Scheme Based on Schnorr Signature Security and Performance Analysis Conclusion 3

Introduction This paper proposed two integrity verification schemes based on Schnorr Signature Scheme. 4 Safety integrity verification scheme (SIVS). Efficient integrity verification scheme (EIVS).

Outline Introduction Schnorr Signature Scheme Safety Integrity Verification Scheme Based on Schnorr Signature Efficient Integrity Verification Scheme Based on Schnorr Signature Security and Performance Analysis Conclusion 5

Schnorr Signature Scheme (1/3) 6

Schnorr Signature Scheme (2/3) 7

Schnorr Signature Scheme (3/3) 8 ?

Outline Introduction Schnorr Signature Scheme Safety Integrity Verification Scheme Based on Schnorr Signature Efficient Integrity Verification Scheme Based on Schnorr Signature Security and Performance Analysis Conclusion 9

Safety Integrity Verification Scheme Based on Schnorr Signature USER message

Safety Integrity Verification Scheme Based on Schnorr Signature USER Challenge Response

Safety Integrity Verification Scheme Based on Schnorr Signature USER Request Response

Safety Integrity Verification Scheme Based on Schnorr Signature (1/8) 13

Safety Integrity Verification Scheme Based on Schnorr Signature (2/8) 14

Safety Integrity Verification Scheme Based on Schnorr Signature (3/8) 15

Safety Integrity Verification Scheme Based on Schnorr Signature (4/8) 16

Safety Integrity Verification Scheme Based on Schnorr Signature (5/8) 17

Safety Integrity Verification Scheme Based on Schnorr Signature (6/8) 18 ?

Safety Integrity Verification Scheme Based on Schnorr Signature (7/8) 19

Safety Integrity Verification Scheme Based on Schnorr Signature (8/8) 20

Outline Introduction Schnorr Signature Scheme Safety Integrity Verification Scheme Based on Schnorr Signature Efficient Integrity Verification Scheme Based on Schnorr Signature Security and Performance Analysis Conclusion 21

Efficient Integrity Verification Scheme Based on Schnorr Signature (1/3) 22

Efficient Integrity Verification Scheme Based on Schnorr Signature (2/3) 23

Efficient Integrity Verification Scheme Based on Schnorr Signature (3/3) 24

Outline Introduction Schnorr Signature Scheme Safety Integrity Verification Scheme Based on Schnorr Signature Efficient Integrity Verification Scheme Based on Schnorr Signature Security and Performance Analysis Conclusion 25

Security and Performance Analysis 26

Security Analysis (1/4) 27

Security Analysis (2/4) 28

Security Analysis (3/4) 29

Security Analysis (4/4) 30

Performance Analysis 31

Outline Introduction Schnorr Signature Scheme Safety Integrity Verification Scheme Based on Schnorr Signature Efficient Integrity Verification Scheme Based on Schnorr Signature Security and Performance Analysis Conclusion 32

Conclusion 33 In view of communication costs and computation costs of current integrity verification schemes are too high, this paper proposes two integrity verification schemes SIVS and EIVS based on Schnorr Signature. If the files need to be stored in cloud for a long time, SIVS scheme will be used to verify the integrity of the file. But in short term, EIVS scheme will be used.