Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage

被引:4
|
作者
Deng, Lunzhi [1 ]
Wang, Bo [2 ]
Wang, Tao [2 ]
Feng, Shuai [2 ]
Li, Siwei [3 ]
机构
[1] Guizhou Normal Univ, Guizhou Prov Specialized Key Lab Informat Secur T, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
[3] Guizhou Normal Univ, Grad Sch, Guiyang 550001, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificateless cryptography; cloud storage; pairing; provable data possession; standard model; AUDITING SCHEME; DATA-MANAGEMENT; EFFICIENT;
D O I
10.1109/TSC.2023.3303185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Provable data possession (PDP) solves the problem of determining whether the data stored in the cloud is maintained in its entirety. Certificateless cryptography simultaneously tackles two challenges: certificate management and key escrow. There are still three deficiencies in the current known certificateless provable data possession (CL-PDP) schemes. First, security proofs are typically conducted in the random oracle model (ROM). Second, some schemes are incapable of preventing third-party auditor (TPA) from recovering user data blocks. Third, most schemes require hash-to-point operations, which result in lower computational efficiency. In this article, we demonstrated two kinds of attacks targeting the scheme Ji et al. 2020. Subsequently, we put forward a new CL-PDP scheme and showed security proofs in the standard model (SM). Finally, we conducted performance analysis on ten CL-PDP schemes. Our scheme outperforms others in terms of efficiency, as it minimizes computational overhead by requiring only three pairing operations and eliminating the need for hash-to-point operations.
引用
收藏
页码:3986 / 3998
页数:13
相关论文
共 50 条
  • [21] Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 795 - 798
  • [22] Group provable data possession with deduplication in cloud storage
    Wang H.-Y.
    Zhu L.-H.
    Li L.-Y.-J.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1417 - 1431
  • [23] New provable data transfer from provable data possession and deletion for secure cloud storage
    Liu, Yudong
    Xiao, Shuai
    Wang, Han
    Wang, Xu An
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [24] Cooperative provable data possession scheme for multicloud storage
    Li, Z. (lizj@buaa.edu.cn), 1731, Tsinghua University (53):
  • [25] An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2532 - 2553
  • [26] Efficient Certificateless Signature Scheme with Provable Security
    Gayathri, N. B.
    Reddy, P. Vasudeva
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 539 - 544
  • [27] Distributed data possession provable in cloud
    Mingxu Yi
    Lifeng Wang
    Jinxia Wei
    Distributed and Parallel Databases, 2017, 35 : 1 - 21
  • [28] Leakage Resilient Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Chen, Yaping
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 706 - 709
  • [29] Distributed data possession provable in cloud
    Yi, Mingxu
    Wang, Lifeng
    Wei, Jinxia
    DISTRIBUTED AND PARALLEL DATABASES, 2017, 35 (01) : 1 - 21
  • [30] Code-based Provable Data Possession Scheme for Integrity Verification in Cloud Storage
    Ye, Junyao
    Wang, Yanhong
    Liu, Kening
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 207 - 212