%0 Journal Article %T Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Ali, Mohammad %D 2022 %\ 10/01/2022 %V 14 %N 3 %P 43-49 %! Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems %K cloud computing %K Data Integrity %K Attribute-Based Authentication %K Data Auditing %K Attribute-Based Cryptography %R 10.22042/isecure.2022.0.0.0 %X Remote data auditing (RDA) protocols enable a cloud server to persuade an auditor that it is storing a data file honestly. Unlike digital signature(DS) schemes, in RDA protocols, the auditor can carry out the auditing procedure without having the entire data file. Therefore, RDA protocols seem to be attractive alternatives to DSs as they can effectively reduce bandwidth consumption. However, existing RDA protocols do not provide adequately powerful tools for user authentication. In this paper, we put forward a novel attribute-based remote data auditing and user authentication scheme. In our proposed scheme, without having a data file outsourced to a cloud server, an auditor can check its integrity and the issuer’s authenticity. Indeed, through a challenge-response protocol, the auditor can check whether 1) the cloud server has changed the content of the data file or not; 2) the data owner possesses specific attributes or not. We show that our scheme is secure under the hardness assumption of the bilinear Diffie-Hellman (BDH) problem. %U https://www.isecure-journal.com/article_159677_d4fb886a2da474a0d1ea04d2d35096cc.pdf