Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management

被引:7
|
作者
Tian, Ying [1 ]
Tan, Haowen [2 ]
Shen, Jian [2 ]
Pandi, Vijayakumar [3 ]
Gupta, Brij B. [4 ,5 ,6 ,7 ,8 ]
Arya, Varsha [9 ,10 ,11 ,12 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Informat Sci & Engn, Hangzhou 310018, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, Tamilnadu, India
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[5] Kyung Hee Univ, 26 Kyungheedae Ro, Seoul 02447, South Korea
[6] Symbiosis Int Univ, Symbiosis Ctr Informat Technol SCIT, Pune, India
[7] Lebanese Amer Univ, Beirut 1102, Lebanon
[8] Dar Al Hekma Univ, Jeddah, Saudi Arabia
[9] Asia Univ, Dept Business Adm, Taichung, Taiwan
[10] Chandigarh Univ, Chandigarh, India
[11] Skyline Univ Coll, Sch Comp, POB 1797, Sharjah, U Arab Emirates
[12] Univ Petr & Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, India
基金
中国国家自然科学基金;
关键词
Cloud storage; Data integrity auditing; Data sharing; Multi-copy storage; Trust management;
D O I
10.1016/j.ins.2023.119255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of cloud storage provides convenient group data sharing services to us. In reality, not only can users upload data to the cloud, but more often they are inclined to download data from the cloud. Unfortunately, data stored on the cloud is not always trustworthy, and downloading Trojan or virus data can bring bad experiences to users. In certain cloud computing scenarios, with the aim of preventing data loss, both the original data and the corresponding data copies are stored. Consequently, the huge amounts of stored data copies result in large storage overhead to the cloud. In order to tackle all of the above problems, an efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management is presented in this paper. In our scheme, the group manager detects shared data and generates short signatures for the data that can pass detection successfully before it is stored on the cloud. Further, the group manager calculates the trust value for users and enhances the management of user behavior according to it. Through adopting data merging, the total amount of data copies and the overhead of users and cloud are reduced in our scheme. In terms of security, our scheme can resist forgery attacks launched by three different adversaries. At last, we prove that our scheme is secure and practical through security and performance analysis, respectively.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage
    Zhang, Qingyang
    Zhang, Zhiming
    Cui, Jie
    Zhong, Hong
    Li, Yang
    Gu, Chengjie
    He, Debiao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (12) : 3162 - 3173
  • [2] RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage
    Guo, Zirui
    Zhang, Kai
    Wei, Lifei
    Chen, Siyuan
    Wang, Liangliang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 141
  • [3] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 356 - 365
  • [4] Efficient Certificateless Multi-Copy Integrity Auditing Scheme Supporting Data Dynamics
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Wang, Huaqun
    Zhang, Yuqing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1118 - 1132
  • [5] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Bian, Genqing
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (12) : 2723 - 2727
  • [6] An improved multi-copy cloud data auditing scheme and its application
    Tu, Zheng
    Wang, Xu An
    Du, Weidong
    Wang, Zexi
    Lv, Ming
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (03) : 120 - 130
  • [7] An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics
    Deng, Zuojie
    Chen, Shuhong
    Tan, Xiaolan
    Song, Dan
    Wu, Fan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 392 - 402
  • [8] Multi-copy dynamic cloud data auditing model based on IMB tree
    Zhang, Yifan
    Lin, Guoyuan
    Gu, Hao
    Zhuang, Fu
    Wei, Guoying
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (02) : 248 - 269
  • [9] Identity-based controlled delegated outsourcing data integrity auditing scheme
    Du, Jianming
    Dong, Guofang
    Ning, Juangui
    Xu, Zhengnan
    Yang, Ruicheng
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [10] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    IEEE ACCESS, 2020, 8 : 206396 - 206405