Lightweight integrity verification scheme for cloud based group data

被引:0
作者
Liu Y.-F. [1 ]
Wang Y.-J. [1 ]
Fu S.-J. [1 ,2 ]
机构
[1] College of Computer, National University of Defense Technology, Changsha
[2] Sate Key Laboratory of Cryptology, Beijing
来源
Tongxin Xuebao/Journal on Communications | 2016年 / 37卷
基金
中国国家自然科学基金;
关键词
Aggregated labels; Cloud storage; Data integrity; Identity privacy;
D O I
10.11959/j.issn.1000-436x.2016260
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect the security of the data stored in the cloud by group users, a data integrity verification scheme was designed which can protect the privacy of the group users. The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data, and use the characteristic of the ring signature to hide the identity of the signer corresponding to the data block. That is, the third-party verifier can not spy on the users identity and other private information when validating. The aggregated approach is used to generate data labels, which reduces the storage cost of labels and supports the dynamic operation of group data, so that the users in the group can easily modify the cloud group data. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:140 / 146
页数:6
相关论文
共 17 条
[11]  
Wang C., Chow S.S., Wang Q., Et al., Privacy-preserving public auditing for secure cloud storage, IEEE Transactions on Computers, 62, 2, pp. 362-375, (2013)
[12]  
Boneh D., Gentry C., Lynn B., Et al., Aggregate and verifiably encrypted signatures from bilinear maps, EUROCRYPT 2003, pp. 416-432, (2003)
[13]  
Zhu Y., Wang H., Hu Z., Et al., Poster: efficient provable data possession for hybird clouds, ACM CCS, (2010)
[14]  
Tate S.R., Vishwanathan R., Everhart L., Multi-user dynamic proofs of data possession using trusted hardware, ACM CODASPY, pp. 353-364, (2013)
[15]  
Wang B., Li B., Li H., Oruta: privacy-preserving public auditing for shared data in the cloud, IEEE 5th International Conference on Cloud Computing (CLOUD'12), pp. 295-302, (2012)
[16]  
Wang B., Li B., Li H., Knox: privacy-preserving auditing for shared data with large groups in the cloud, 10th International Conference on Applied Cryptography and Network Security (ACNS'12), pp. 507-525, (2012)
[17]  
Wang B., Li B., Li H., Public auditing for shared data with efficient user revocation in the cloud, 2013 IEEE International Conference on Computer Communication (INFOCOM'13), pp. 2904-2912, (2013)