Data outsourcing authentication model based on authenticated data structures for cloud computing

The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were anal...

Full description

Saved in:
Bibliographic Details
Main Authors: XU Jian1, ZHOU Fu-cai1, CHEN Xu1, ZHU Zhi-liang2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419316/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.
ISSN:1000-436X