Lightweight integrity verification scheme for cloud based group data

被引:0
作者
Liu Y.-F. [1 ]
Wang Y.-J. [1 ]
Fu S.-J. [1 ,2 ]
机构
[1] College of Computer, National University of Defense Technology, Changsha
[2] Sate Key Laboratory of Cryptology, Beijing
来源
Tongxin Xuebao/Journal on Communications | 2016年 / 37卷
基金
中国国家自然科学基金;
关键词
Aggregated labels; Cloud storage; Data integrity; Identity privacy;
D O I
10.11959/j.issn.1000-436x.2016260
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect the security of the data stored in the cloud by group users, a data integrity verification scheme was designed which can protect the privacy of the group users. The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data, and use the characteristic of the ring signature to hide the identity of the signer corresponding to the data block. That is, the third-party verifier can not spy on the users identity and other private information when validating. The aggregated approach is used to generate data labels, which reduces the storage cost of labels and supports the dynamic operation of group data, so that the users in the group can easily modify the cloud group data. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:140 / 146
页数:6
相关论文
共 17 条
[1]  
Ateniese G., Burns R., Curtmola R., Et al., Provable data possession at untrusted stores, ACM CCS, pp. 598-610, (2007)
[2]  
Ateniese G., Kamara S., Katz J., Proofs of storage from homomorphic identification protocols, pp. 319-333, (2009)
[3]  
Boneh D., Lynn B., Shacham H., Short signature from the weil pairing, ASIACRYPT 2001, pp. 514-532, (2001)
[4]  
Shacham H., Waters B., Compact proofs of retrievability, ASIACRYPT 2008, pp. 90-107, (2008)
[5]  
Ateniese G., Pietro R.D., Mancini L.V., Et al., Scalable and efficient provable data possession, 4th ICST SecureComm, (2008)
[6]  
Wang Q., Wang C., Li J., Et al., Enabling public verifiability and data dynamic for storage security in cloud computing, ESORICS 2009, pp. 355-370, (2009)
[7]  
Erway C., Kupcu A., Papamanthou C., Et al., Dynamic provable data possession, Proceedings of ACM CCS, pp. 213-222, (2009)
[8]  
Zhu Y., Wang H., Hu Z., Et al., Dynamic audit services for integrity verification of outsourced storage in cloud, ACM SAC, pp. 1550-1557, (2011)
[9]  
Zhu Y., Ahn G.J., Hu H., Et al., Dynamic audit services for outsourced storage in clouds, IEEE Transactions on Services Computing, 6, 99, (2013)
[10]  
Wang C., Wang Q., Ren K., Et al., Privacy-preserving public auditing for data storage security in cloud computing, IEEE INFOCOM, pp. 525-533, (2010)