Abstract
With the widespread adoption of cloud computing, cloud storage technology has developed rapidly, but issues of data security and privacy protection have also become prominent. As a key means to ensure the security of cloud storage data, cloud auditing technology strengthens the data security defense for users by verifying data integrity and availability. In recent years, advancements in trusted execution environment (TEE) technology have brought higher security guarantees to cloud auditing. However, existing TEE-based multi-replica data auditing schemes, such as TEEMRDA (trusted execution environment-based multi-replica data audit), still have security vulnerabilities when facing specific attacks. This paper deeply analyzes the security risks of the TEEMRDA scheme, proposes an improved cloud data auditing scheme, comprehensively evaluating them from dimensions such as security and performance. The results show that the improved scheme performs excellently in resisting specific attacks and has significant advantages in performance. The scheme proposed by Hui Tian et al. (2025) exhibits potential security vulnerabilities under specific attack scenarios. The improved scheme can overcome the security problems and can be applied to unmanned aerial vehicles.
Introduction
The rapid development of information technology has made cloud computing an extremely efficient and flexible computing model, profoundly reshaping the modern information technology architecture. By virtue of its ability to allocate computing resources and storage services on demand, cloud computing has significantly reduced IT costs for organizations and individuals, while effectively improving resource utilization and system scalability. However, the widespread adoption of cloud computing has also given rise to numerous security challenges, particularly in the field of cloud storage, where risks such as data leakage, tampering, and loss persist.
The security of cloud storage has long been a key research focus in academia. In the cloud storage model, users store data on remote servers, transferring control and management rights to cloud storage provider (CSPs). While this model offers convenience, it has sparked concerns among users regarding data security and privacy protection. To ensure cloud storage security, researchers have proposed various security mechanisms and technologies, with cloud auditing technology emerging as a critical and highly regarded approach. Traditional cloud auditing methods overly rely on the credibility of CSPs, which to some extent undermines the independence and effectiveness of audits. With the development of trusted execution environment (TEE) technology, TEE-based cloud auditing schemes have gradually become a research hotspot. The secure execution environment provided by TEE can effectively isolate malicious software and attackers, enhancing the security of cloud auditing.
In cloud storage environments, data is often stored in multiple copies across different physical nodes to enhance data reliability and availability. Multi-replica data auditing achieves data redundancy and fault tolerance by generating multiple data copies and distributing them across storage nodes, thereby reducing risks of data corruption, leakage, or tampering. However, existing multi-replica data auditing schemes still exhibit security shortcomings. Although the TEEMRDA (trusted execution environment-based multi-replica data audit) scheme employs TEE technology, it lacks sufficient protection against specific attacks. Furthermore, the widespread application of unmanned aerial vehicle (UAV) technology has introduced new security challenges to cloud-edge UAV systems. Ensuring the security of data storage and transmission during data interaction between UAVs and the cloud is of paramount importance. Therefore, researching cloud storage data auditing mechanisms suitable for cloud-edge UAV systems holds significant practical value.
This paper aims to deeply explore the security vulnerabilities of the TEEMRDA scheme and propose an improved cloud storage data auditing mechanism to strengthen data security in cloud storage. The article first reviews relevant research on cloud storage security, cloud auditing, and multi-replica data auditing. It then provides a detailed analysis of the principles and security issues of the TEEMRDA scheme, followed by the proposal of an improved scheme. Finally, a comprehensive analysis and evaluation of the security and performance of the improved scheme are conducted.
Related work
Cloud auditing technology is a critical means to ensure the integrity and privacy of cloud storage data. Early cloud auditing schemes primarily relied on the credibility of CSPs, but the independence and effectiveness of audits were difficult to guarantee under this model. To overcome this limitation, researchers have proposed various improved schemes, mainly focusing on cryptography-based auditing schemes, blockchain-based auditing schemes, optimized audit processes, and auditing schemes in multi-tenant environments.
In the field of cryptography-based technologies, the provable data possession (PDP) scheme proposed by Ateniese et al. enables users to verify data integrity without downloading data. However, this scheme incurs high computational costs when handling large-scale data and struggles to support dynamic data updates. To address these issues, Wang et al. 1 proposed the first public auditing scheme supporting privacy protection. By integrating public key homomorphic authenticators with random masking techniques, this scheme allows third-party auditors (TPAs) to verify the integrity of cloud-stored data without disclosing user data privacy. It also achieves batch auditing for multiple users through bilinear aggregation signatures. Nevertheless, the scheme still has certain security vulnerabilities when facing collusion attacks between malicious CSPs and TPAs. Literature 2 explores identity-based user revocation mechanisms and privacy protection schemes for cloud storage. It uses indistinguishability obfuscation (IO) technology to achieve lightweight data possession proof, reduces computational overhead through random sampling authenticators, and proposes a Compact Proofs of Retrievability scheme based on pseudorandom function (PRF) and boneh-lynn-shacham (BLS) signatures to optimize storage costs. However, IO technology remains immature, making practical deployment challenging, and its security relies on idealized cryptographic assumptions.
Due to its decentralized and tamper-proof characteristics, blockchain technology has gradually become a research hotspot in cloud auditing. Wang et al. 3 note that blockchain technology is increasingly applied in cloud storage and fog computing, particularly in data possession proof and dynamic auditing, enhancing data security and transparency through distributed ledger technology. Literature 4 discusses the application of blockchain and fog computing in cloud data integrity auditing, combining the decentralization of blockchain with the efficiency of fog computing to provide a new solution for data integrity auditing. However, blockchain storage evidence introduces additional overhead, and smart contract execution delays may affect real-time performance in high-concurrency scenarios. Literature 5 proposes a cloud storage auditing scheme combining blockchain and smart contract technology, achieving fair payment and data privacy protection with high computational efficiency, though its security relies on the mathematical assumptions of elliptic curves.
Some studies focus on optimizing audit processes to reduce computational and communication overheads. Li et al. 6 first applied dynamic hash tables (DHT) to cloud auditing, combining BLS signatures and bilinear mappings to address the efficiency issues of traditional batch auditing schemes. However, DHT may face hash collision risks for ultra-large-scale data, and BLS signatures have high requirements for bilinear group operations, which may be unsuitable for extremely resource-constrained devices. Yang and Jia 7 proposed an efficient and privacy-preserving dynamic auditing protocol, using DHT to record data changes, supporting dynamic data operations, and reducing auditors’ computational costs. However, its privacy protection mechanism is weak, and the problem of potential metadata leakage by TPAs remains unsolved. Literature 8 presents a multi-replica public auditing scheme based on Merkle tree hash structures, supporting efficient verification and fine-grained updates, but attackers may tamper with Merkle tree hash values or forge data replicas to bypass auditing mechanisms and threaten data confidentiality.
In multi-tenant environments, Thenmozhi 9 studied how to reduce user-side computational costs by aggregating labels of different data blocks and designed an efficient public integrity checking mechanism. However, shared key management and updates may lead to security risks, affecting the overall security of the auditing system. Ardagna et al. 10 proposed an auditing mechanism for distributed erasure-coded data, introducing a new behavioral modeling scheme to audit virtual machine behaviors and detect suspicious processes, reducing users’ computational and communication costs. However, the scheme may fail to effectively counter internal attacks, leading to data security risks.
Literature 11 provides a comprehensive review of blockchain technology, data integrity auditing, and identity-based remote data auditing schemes in cloud storage, exploring how to ensure data integrity and security while protecting user privacy. Literature 12 proposes an innovative certificate-less cloud data auditing scheme, addressing the complex certificate management and key escrow risks in traditional schemes to enhance system security and practicality, though its performance and efficiency in large-scale data environments require further verification. Literature 13 discusses challenges and solutions in cloud auditing, including methods for TPAs to verify dynamic data integrity, CSP auditing practices, and applications of cloud auditing frameworks and tools, but it relies on trusted TPAs, posing single-point-of-failure risks. Literature 14 first uses a serverless computing paradigm to build a cloud storage auditing system, demonstrating its practicality and cost-effectiveness by leveraging serverless computing's elastic scaling and pay-as-you-go features, though it depends on specific cloud providers’ serverless platforms with unvalidated cross-platform compatibility. Literature 15 explores the application of cloud computing and IoT technologies in auditing, focusing on the operation mechanisms, protection strategies, and security risks of cloud auditing platforms, but it relies on centralized cloud providers with insufficient decentralization capabilities. Literature 16 designs an identity-based auditing protocol, using a key generation center (KGC) to allocate keys and support data owners (DOs) in dynamically enabling/disabling sensitive information access rights without third-party purifiers, though centralized KGCs face single-point-of-failure risks. Literature 17 proposes a hybrid cloud auditing system architecture, achieving hardware and software sharing through resource pooling to reduce operational costs, but its multi-layered architecture increases system complexity and difficulty in fault troubleshooting. Literature 18 combines elliptic curve cryptography and blockchain technology to propose a lightweight identity authentication and key update scheme, outsourcing key update computations to TPAs and cloud servers to reduce user-side overhead, though bilinear mapping operations still impose high computational burdens.
Cloud data auditing is mainly divided into private auditing and public auditing. Private auditing is managed by users themselves, while public auditing is performed by trusted TPAs on behalf of users. Public auditing has gained wide attention due to its ability to reduce user burdens and provide more reliable audit results. Functionally, public auditing can be further divided into privacy-preserving auditing, dynamic data auditing, shared data auditing, and multi-replica data auditing. This paper focuses on multi-replica data auditing. Multi-replica data auditing aims to verify the integrity and availability of data in cloud storage environments. In cloud storage scenarios, user data is typically replicated multiple times and distributed across different servers to enhance data reliability and fault tolerance. The core task of multi-replica data auditing is to verify the consistency and integrity of these replicas, ensuring data is not tampered with, lost, or damaged during storage and transmission.
In recent years, researchers have sought to improve the efficiency and security of multi-replica data auditing through various technical means, with main research directions including blockchain-based auditing schemes, multi-party participation auditing mechanisms, identity-based auditing technologies, and certificate-less/dynamic data auditing schemes. Due to its decentralization, tamper-proofing, and traceability, blockchain technology is widely used in multi-replica data auditing. Literature 19 proposes an efficient multi-replica auditing scheme for multi-cloud environments, achieving high-efficiency auditing via homomorphic verification tags (HVT), but the scheme relies on third-party aggregation nodes, posing collusion attack risks. Literature 20 presents a dynamic multi-cloud multi-replica data integrity auditing scheme based on blockchain technology, using smart contracts to automate audit tasks and solve trust issues with traditional TPAs, though blockchain consensus mechanisms introduce delays and large-scale data label generation incurs high computational costs. Literature 21 proposes a multi-party participation efficient data integrity auditing mechanism supporting multi-data-source, heterogeneous data, and dynamic data modification scenarios, achieving various verification functions through distributed ledgers, smart contracts, and consensus mechanisms, though smart contract execution efficiency is constrained by blockchain platform performance.
Dynamic data auditing is a key direction in multi-replica data auditing. Literature 22 studies multi-replica possession auditing strategies for dynamic data in cloud storage environments, proposing a homomorphic hash-based multi-replica data possession proof scheme that effectively resists malicious storage node attacks, though the scheme's complex structure leads to high large-scale data maintenance costs. Literature 23 introduces an efficient multi-replica integrity verification scheme, enabling fast verification via short signatures and DHT while supporting large-scale dynamic data updates and integrity verification, though interactions with multiple cloud storage servers in multi-replica environments increase communication overhead, and cross-cloud platform audit delays reduce efficiency.
Multi-party participation auditing mechanisms improve audit reliability and efficiency by involving multiple stakeholders. Literature 24 addresses the issues of massive files and inefficient single-node auditing in cloud storage by proposing a multi-agent-based multi-replica data integrity checking scheme. Using bilinear mapping for key generation and multi-branch authentication trees for multi-replica data signing, the scheme outperforms existing methods in communication overhead, storage overhead, and audit efficiency, though multi-agent systems are complex and incur high implementation and management costs. Literature 25 proposes a red-black tree-based dynamic multi-replica data integrity auditing scheme. By improving the classic Merkle hash tree (MHT), it enables multi-replica storage and dynamic data operations, enhancing real-time dynamic data update (insertion, deletion, modification) efficiency. Third-party audit organizations verify data integrity on behalf of users to reduce computational and communication costs, but the red-black tree structure is complex and difficult to implement.
Identity-based cryptography (IBC) and certificate-based schemes are also widely used in multi-replica data auditing. Literature 26 proposes an identity-based public auditing scheme for verifying multi-replica data integrity, avoiding the complexity of certificate management in traditional public key cryptography, though the scheme highly relies on TPA credibility, affecting data security. Literature 27 presents a certificate-based multi-replica cloud storage auditing scheme supporting dynamic data updates, addressing complex key management via certificate mechanisms while supporting dynamic updates, though certificate management may introduce additional complexity. Literature 28 proposes a revocable and dynamic identity-based multi-replica data auditing scheme (RDIMM), combining IBC with dynamic auditing mechanisms to support efficient auditing of multi-replica data, though dynamic data updates and revocable mechanisms may introduce extra computational and storage overheads.
Identity-based auditing technologies have been introduced to further improve audit efficiency and security. Literature 29 explores public auditing schemes for multi-replica data in cloud storage environments, enhancing audit efficiency and security via homomorphic hash tables and timestamp signature mechanisms, though computational costs remain high in large-scale data scenarios. Literature 30 designs a multi-replica cloud auditing scheme using Shamir's secret sharing technology, enhancing data security and privacy protection through shard storage and secret sharing mechanisms, though secure key management is critical—key leakage or tampering could allow attackers to forge shared information or recover secrets. Literature 31 proposes an ID-based dynamic multi-replica data auditing scheme, achieving efficient data integrity auditing by optimizing challenge algorithms and simplifying TPA computations, though it faces key escrow issues. To avoid certificate management and key escrow problems, Literature32–34 propose certificate-less multi-replica data auditing schemes, reducing certificate management complexity and improving audit efficiency via innovative key management mechanisms. Literature 35 presents a TEE-based efficient and secure auditing scheme, implementing multi-replica data auditing via random masking and dual authentication mechanisms with certificate-less signatures, though it is vulnerable to forgery attacks and will be a key focus of this paper.
Background and preliminary knowledge
System model
This system focuses on multi-replica data auditing scenarios in multi-cloud environments, comprising the following core participants:

System model.
The DO is trustworthy and correctly uses TEE to generate tags and keys, but their local environment may face side-channel attacks. The CSP is semi-trustworthy, honestly executing the protocol but possibly maliciously forging audit proofs—such as exploiting hash chain vulnerabilities in TEEMRDA to generate fake check values, or colluding with other CSPs to cover up multi-replica inconsistency issues. The TPA is honest and trustworthy, strictly following the audit protocol, but the communication link may be eavesdropped on or tampered with. The KGC is completely trustworthy, and the system parameter and private key generation processes cannot be breached. Generally, the security of our scheme is based on the difficulty assumptions of the following problems:
Computational
Diffie–Hellman (CDH) Problem (Katz, 2010): Let
Computational Discrete Logarithm Problem (DLP)
(McCurley, 1990): Let
Design goal
The cloud storage data auditing mechanism proposed in this study sets core objectives around ensuring data security and improving audit reliability, specifically as follows:
Trusted execution environment
TEE is a secure execution environment based on hardware isolation, separated from the device's regular operating system rich execution environment (REE), used to protect the confidentiality, integrity, and availability of sensitive code and data. It relies on hardware extensions such as ARM's TrustZone and Intel's SGX to divide independent execution regions at the Central Processing Unit level, and the full lifecycle management of keys is completed within the TEE, ensuring that even if the REE is attacked, operations within the TEE remain unaffected. Additionally, TEE has low resource consumption, adapts to the lightweight deployment requirements of cloud servers, and meets the elastic expansion and low-latency audit requirements of cloud environments.
Security attributes provided by TEE
General advantages of TEE in cloud environments
Preliminary knowledge
Bilinear pairings
Bilinear pairings are a class of special mathematical mappings in cryptography, with the core definition as follows:
Let
Homomorphic verifiable authenticator (HVA)
HVA is a cryptographic-based authentication mechanism that allows efficient verification of data without exposing its content, ensuring the integrity and correctness of data during computation.
Review of three key stages of the TEEMRDA algorithm
Initialization stage
The initialization stage serves as the foundation of the TEEMRDA scheme, primarily responsible for completing system parameter configuration, user key generation, creation of TEE-assisted key pairs, and generation of data block tags—thereby providing the necessary cryptographic foundations and security parameters for the subsequent replica generation and verification stages.
Replica generation stage
The replica generation stage is a critical link in the TEEMRDA scheme, aiming to securely generate multiple data replicas through a TEE and construct efficient, tamper-resistant block tags (fair dual authenticators) for each replica. The core goal of this stage is to ensure data confidentiality while providing a reliable integrity verification basis for the subsequent verification stage, ensuring that multi-replica data stored in the CSP can be efficiently audited.
After the above operations, m data replicas
Verification stage
The verification stage is the final link of the TEEMRDA scheme, aiming to conduct integrity audits on multi-replica data stored in the CSP through a TPA. This stage ensures that the CSP honestly stores user data replicas and prevents data loss, tampering, or non-compliant storage through a “challenge-response-verification” mechanism, mainly including the following three parts:
Finally, the primary server returns the response proof
Attack path analysis of TEEMRDA
Assume an attacker (e.g., a malicious CSP) has successfully forged the data proof M, attempting to reverse-construct a fake auxiliary parameter
Content addition attack (forging non-existent data blocks)
The attacker fabricates non-existent data blocks to create an illusion of “expanded storage capacity,” essentially exploiting the openness of cryptographic commitment schemes to inject fake commitment values into challenge responses, bypassing the integrity verification mechanism for data existence. Forging Data Proof
Forging Tag Proof
Constructing Fake
Content deletion attack (deleting partial original blocks)
The attacker removes partial original data blocks to reduce actual storage costs, while tampering with tags and proof values to mislead verifiers about data integrity. Forging Data Proof
Forging Tag Proof
Content modification attack (tampering with original data blocks)
The attacker modifies original data block contents (e.g., injecting malicious code or deleting sensitive information) while forging tags and auxiliary parameters to make the verification equation hold after tampering. This attack relies on the mathematical deconstruction of the binding relationship between data blocks and tags. Modify the data block
Forging Tag Proof
Improved scheme and performance analysis
Improved scheme
The TEEMRDA literature proposes a scheme for integrity verification of multi-replica data storage. Although TEE provides hardware-level isolation, it still faces risks of side-channel attacks, collusion attacks, and multi-replica forgery attacks, while having certain limitations in the face of forgery attacks. The improved scheme introduces homomorphic encryption and zero-knowledge proof technologies to effectively resist forgery attacks, demonstrating significant improvements compared to the TEEMRDA scheme. In the data proof generation process of the TEEMRDA scheme, for the jth replica file, the sub-server generates the data proof
In the improved scheme, homomorphic encryption technology is introduced in data proof generation. The DO homomorphically encrypts the data block
Performance analysis
Security analysis
Protection Against Data Proof Forgery: In the TEEMRDA scheme, attackers can tamper with the data proof
Protection Against Tag Proof Forgery: The tag proof of the TEEMRDA scheme is vulnerable to forgery, as attackers can forge tags
Protection Against Verification Equation Forgery: The verification equation of the TEEMRDA scheme is based on bilinear pairings, but attackers can exploit its algebraic structure to forge M and
Comparative analysis of security performance.
Comparative analysis of security performance.
Encryption and Decryption Overhead: Introducing homomorphic encryption increases the computational overhead for DOs during the data encryption phase. Homomorphic encryption algorithms typically rely on complex mathematical operations such as large integer arithmetic and modular operations, making the encryption process relatively time-consuming. For example, some homomorphic encryption algorithms may significantly increase encryption time when processing large-scale data. However, with the development of cryptographic technologies, partial homomorphic encryption algorithms have seen significant improvements in computational efficiency and can reduce computation time through hardware acceleration (e.g., dedicated encryption chips). In the decryption phase, verifiers need to decrypt and verify homomorphic computation results, which also imposes certain computational burdens, though the decryption complexity is generally lower than encryption. Aggregated signature technology requires the DO and TEE to perform signature calculations separately during the signature generation phase, consuming certain computational resources. Signature calculations involve private key operations and hash operations, etc., and the computation volume can be considerable for signing a large number of data blocks. However, during the verification phase, aggregated signature verification is relatively efficient, as it can verify the aggregated result of multiple signatures at once, reducing verification computational overhead compared to verifying each signature individually.
Verification Phase Computational Overhead: During the verification phase, verifiers need to verify the homomorphic encryption data proof
Comparative analysis of computational performance.
Comparative analysis of computational performance.
Data Transmission Volume: Since homomorphically encrypted ciphertexts are typically longer than original data, the improved scheme increases data transmission volume during the data transmission process. For example, the ciphertext length generated by some homomorphic encryption algorithms may be several times that of the original data, occupying more network bandwidth and potentially causing network congestion and reducing data transmission efficiency, especially when transmitting large volumes of data. To mitigate this issue, data compression technology can be used to compress homomorphic encryption ciphertexts and reduce transmission volume. Meanwhile, optimizing network transmission protocols and adopting efficient data transmission strategies (such as block transmission and asynchronous transmission) can improve data transmission efficiency. Although aggregated signatures reduce the number of signatures, the signature information itself may contain certain additional data (such as signature parameters), increasing transmission volume to some extent. During the verification phase, the cloud server needs to transmit information such as homomorphic encryption data proof
Number of Communication Interactions: The introduction of zero-knowledge proof technology increases the number of communication interactions between verifiers and provers (e.g., CSP). In the zero-knowledge proof process, verifiers need to send challenge information to provers, who compute and return response information based on the challenges, and verifiers then verify the response information—this process may require multiple interactions to complete. Frequent communication interactions increase communication latency and reduce system response speed. To reduce the number of interactions, zero-knowledge proof protocols can be optimized by adopting non-interactive zero-knowledge proof technologies, simplifying multiple interactions into a single proof transmission to improve communication efficiency. Table 3 presents a comparative analysis of communication performance.
Comparative analysis of communication performance.
Comparative analysis of communication performance.
Definition and parameter description of computational overhead
This paper constructs computational overhead models for both the original TEEMRDA scheme and the improved scheme, targeting three core participants: the DO, CSP, and TPA. By defining time overhead benchmarks for key operations, the computational load differences between the two schemes across all participants are quantitatively compared. Table 4 presents the definitions of different notations and their corresponding operational descriptions.
Symbolic mean of computational overhead.
Symbolic mean of computational overhead.
n: total number of data blocks uploaded by the DO
k: number of data replicas
c: number of data blocks challenged by the TPA
m: number of sub-servers under the CSP (corresponding to the number of replica storage nodes)
Computational overhead of the data owner
The core operations of the DO include key generation, data block processing, and tag generation. The improved scheme adds operations related to homomorphic encryption and aggregate signatures.
Original Scheme (TEEMRDA): The DO needs to perform three core operations: user key generation, TEE-assisted key pair verification, and data block tag generation. The overhead expression is:
Improved Scheme: New operations include homomorphic encryption (data block encryption) and aggregate signature (joint tag signing). The key generation process is consistent with the original scheme. The overhead expression is:
Overhead Variation:
Computational overhead of the cloud storage provider
The core operations of the CSP include replica generation, proof generation (data proof + tag proof), and global proof aggregation. The improved scheme requires processing ciphertext operations after homomorphic encryption.
Original Scheme (TEEMRDA): Sub-servers under the CSP generate replica data blocks, tag proofs, and data proofs, while the main server aggregates the global proof. The overhead expression is:
Improved Scheme: It requires linear combination operations on homomorphic encrypted ciphertexts, and tag proof is replaced with aggregate signature verification. The overhead expression is:
Overhead Variation:
Computational overhead of the third-party auditor
The core operations of the TPA include challenge generation and proof verification. The improved scheme adds a zero-knowledge proof verification step.
Original Scheme (TEEMRDA): The TPA generates challenge information and verifies the global proof based on bilinear pairing. The overhead expression is:
Improved Scheme: It adds zero-knowledge proof verification, and the proof verification process combines ciphertext verification and aggregate signature verification. The overhead expression is:
Overhead Variation:
Quantitative comparison and result analysis
Then the calculation expenses of DO, CSP, and TPA in the original scheme and the improved scheme are shown in Table 5. As can be seen from Table 5, the computational load of the DO, CSP, and TPA in the proposed scheme has all increased, mainly due to the introduction of homomorphic encryption technology during the data proof generation phase. Although the efficiency is slightly reduced, the security is significantly improved, which achieves the expected research objectives.
Comparison of computational overhead.
Comparison of computational overhead.
With the extensive application of UAV technology in fields such as mapping, inspection, logistics, and emergency rescue, the demand for security and integrity of UAV data has become increasingly prominent. Critical information generated during UAV operations, such as geographical information, surveillance videos, and sensor data, if tampered with, leaked, or lost, will not only lead to operational failures but also trigger significant safety accidents or privacy leakage risks. Cloud auditing technology, with its data verification and security protection capabilities, provides an innovative solution for UAV data security management.
UAV data features strong real-time performance, large volume, and multi-source heterogeneity, and needs to be transmitted via wireless communication links to ground control centers or cloud storage platforms during flight. Transmission chains are vulnerable to interference, interception, and malicious attacks. Traditional data security protection means struggle to meet the full-lifecycle security requirements of UAV data, while cloud auditing technology plays a key role in data storage, transmission, and usage phases. In the data storage link, cloud auditing verifies the integrity of data uploaded by UAVs to the cloud, ensuring no illegal tampering; during data transmission, real-time auditing of communication data promptly detects abnormal traffic and attack behaviors to safeguard transmission security; in the data usage phase, cloud auditing performs permission verification and operation auditing for users and applications accessing UAV data, preventing data abuse and leakage.
Conclusion
In summary, this paper thoroughly analyzes the security vulnerabilities of the TEEMRDA scheme in multi-replica data auditing. To address its susceptibility to forgery attacks, we propose an improved scheme incorporating homomorphic encryption, aggregate signatures, and zero-knowledge proof technologies. Comparative analysis demonstrates that the improved scheme significantly enhances security through ciphertext computation encryption, signature-ciphertext binding, and verification mechanism reinforcement, effectively resisting various forgery attacks. Future research will focus on optimizing these technologies to achieve a better balance between security and performance, thereby promoting the broader application of cloud storage data auditing technology in fields such as cloud computing and cloud-edge UAV systems.
Footnotes
Funding
The authors disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work is supported by National Natural Science Foundation of China (No. 62172436) and Engineering University of PAP's Funding for Education and Teaching Program Grant (No.Wjx2025069), Engineering University of PAP's Funding for Basic and Cutting-Edge Innovation Grant (No.Wjy202520). This work is also supported by the Stability Program of the National Key Laboratory of Security Communication (WD202513).
Declaration of conflicting interests
The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
