Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage

被引:4
作者
Deng, Lunzhi [1 ]
Wang, Bo [2 ]
Wang, Tao [2 ]
Feng, Shuai [2 ]
Li, Siwei [3 ]
机构
[1] Guizhou Normal Univ, Guizhou Prov Specialized Key Lab Informat Secur T, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
[3] Guizhou Normal Univ, Grad Sch, Guiyang 550001, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless cryptography; cloud storage; pairing; provable data possession; standard model; AUDITING SCHEME; DATA-MANAGEMENT; EFFICIENT;
D O I
10.1109/TSC.2023.3303185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Provable data possession (PDP) solves the problem of determining whether the data stored in the cloud is maintained in its entirety. Certificateless cryptography simultaneously tackles two challenges: certificate management and key escrow. There are still three deficiencies in the current known certificateless provable data possession (CL-PDP) schemes. First, security proofs are typically conducted in the random oracle model (ROM). Second, some schemes are incapable of preventing third-party auditor (TPA) from recovering user data blocks. Third, most schemes require hash-to-point operations, which result in lower computational efficiency. In this article, we demonstrated two kinds of attacks targeting the scheme Ji et al. 2020. Subsequently, we put forward a new CL-PDP scheme and showed security proofs in the standard model (SM). Finally, we conducted performance analysis on ten CL-PDP schemes. Our scheme outperforms others in terms of efficiency, as it minimizes computational overhead by requiring only three pairing operations and eliminating the need for hash-to-point operations.
引用
收藏
页码:3986 / 3998
页数:13
相关论文
共 37 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Remote Data Checking Using Provable Data Possession
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Khan, Osama
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [4] Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case
    Bian, Genqing
    Chang, Jinyong
    [J]. IEEE ACCESS, 2020, 8 : 102958 - 102970
  • [5] The random oracle methodology, revisited
    Canetti, R
    Goldreich, O
    Halevi, S
    [J]. JOURNAL OF THE ACM, 2004, 51 (04) : 557 - 594
  • [6] Curtmola R., 2008, P 4 ACM INT WORKSHOP, P63, DOI DOI 10.1145/1456469.1456481
  • [7] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    [J]. IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [8] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [9] An efficient certificateless public auditing scheme in cloud storage
    Gao, Gaimei
    Fei, Hongxia
    Qin, Zefeng
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (24)
  • [10] Outsourced dynamic provable data possession with batch update for secure cloud storage
    Guo, Wei
    Zhang, Hua
    Qin, Sujuan
    Gao, Fei
    Jin, Zhengping
    Li, Wenmin
    Wen, Qiaoyan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 : 309 - 322