Data outsourcing authentication model based on authenticated data structures for cloud computing

The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were anal...

Full description

Saved in:
Bibliographic Details
Main Authors: XU Jian1, ZHOU Fu-cai1, CHEN Xu1, ZHU Zhi-liang2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2011-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74419316/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537127785955328
author XU Jian1
ZHOU Fu-cai1
CHEN Xu1
ZHU Zhi-liang2
author_facet XU Jian1
ZHOU Fu-cai1
CHEN Xu1
ZHU Zhi-liang2
author_sort XU Jian1
collection DOAJ
description The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.
format Article
id doaj-art-c7f79ecd1ae8432ab40861a55e447a45
institution Kabale University
issn 1000-436X
language zho
publishDate 2011-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-c7f79ecd1ae8432ab40861a55e447a452025-01-14T08:45:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013215316074419316Data outsourcing authentication model based on authenticated data structures for cloud computingXU Jian1ZHOU Fu-cai1CHEN Xu1ZHU Zhi-liang2The outsourcing authentication model based on authenticated data structures was proposed.The formal defini-tion,data query authentication protocol and data updating authentication protocol of the model was presented.The crucial problems when the authenticated data structures are being used were analyzed.With designing the new extended coher-ence proof generation algorithm and the new extended verifying algorithm,authenticated data structures in the model very well was used.Finally the model with others through the performance analysis including the security and efficiency,the results of which show that:the model is more efficient than others as well as the consistency and correctness require-ments are also guaranteed.http://www.joconline.com.cn/zh/article/74419316/cloud computingauthenticated data structuresdata outsourcingauthenticated skip list
spellingShingle XU Jian1
ZHOU Fu-cai1
CHEN Xu1
ZHU Zhi-liang2
Data outsourcing authentication model based on authenticated data structures for cloud computing
Tongxin xuebao
cloud computing
authenticated data structures
data outsourcing
authenticated skip list
title Data outsourcing authentication model based on authenticated data structures for cloud computing
title_full Data outsourcing authentication model based on authenticated data structures for cloud computing
title_fullStr Data outsourcing authentication model based on authenticated data structures for cloud computing
title_full_unstemmed Data outsourcing authentication model based on authenticated data structures for cloud computing
title_short Data outsourcing authentication model based on authenticated data structures for cloud computing
title_sort data outsourcing authentication model based on authenticated data structures for cloud computing
topic cloud computing
authenticated data structures
data outsourcing
authenticated skip list
url http://www.joconline.com.cn/zh/article/74419316/
work_keys_str_mv AT xujian1 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing
AT zhoufucai1 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing
AT chenxu1 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing
AT zhuzhiliang2 dataoutsourcingauthenticationmodelbasedonauthenticateddatastructuresforcloudcomputing