Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management

被引:7
|
作者
Tian, Ying [1 ]
Tan, Haowen [2 ]
Shen, Jian [2 ]
Pandi, Vijayakumar [3 ]
Gupta, Brij B. [4 ,5 ,6 ,7 ,8 ]
Arya, Varsha [9 ,10 ,11 ,12 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Peoples R China
[2] Zhejiang Sci Tech Univ, Sch Informat Sci & Engn, Hangzhou 310018, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, Tamilnadu, India
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[5] Kyung Hee Univ, 26 Kyungheedae Ro, Seoul 02447, South Korea
[6] Symbiosis Int Univ, Symbiosis Ctr Informat Technol SCIT, Pune, India
[7] Lebanese Amer Univ, Beirut 1102, Lebanon
[8] Dar Al Hekma Univ, Jeddah, Saudi Arabia
[9] Asia Univ, Dept Business Adm, Taichung, Taiwan
[10] Chandigarh Univ, Chandigarh, India
[11] Skyline Univ Coll, Sch Comp, POB 1797, Sharjah, U Arab Emirates
[12] Univ Petr & Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, India
基金
中国国家自然科学基金;
关键词
Cloud storage; Data integrity auditing; Data sharing; Multi-copy storage; Trust management;
D O I
10.1016/j.ins.2023.119255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of cloud storage provides convenient group data sharing services to us. In reality, not only can users upload data to the cloud, but more often they are inclined to download data from the cloud. Unfortunately, data stored on the cloud is not always trustworthy, and downloading Trojan or virus data can bring bad experiences to users. In certain cloud computing scenarios, with the aim of preventing data loss, both the original data and the corresponding data copies are stored. Consequently, the huge amounts of stored data copies result in large storage overhead to the cloud. In order to tackle all of the above problems, an efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management is presented in this paper. In our scheme, the group manager detects shared data and generates short signatures for the data that can pass detection successfully before it is stored on the cloud. Further, the group manager calculates the trust value for users and enhances the management of user behavior according to it. Through adopting data merging, the total amount of data copies and the overhead of users and cloud are reduced in our scheme. In terms of security, our scheme can resist forgery attacks launched by three different adversaries. At last, we prove that our scheme is secure and practical through security and performance analysis, respectively.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] An efficient identity-based QER cryptographic scheme
    Meshram, Chandrashekhar
    Powar, P. L.
    COMPLEX & INTELLIGENT SYSTEMS, 2016, 2 (04) : 285 - 291
  • [32] Identity-based multi-replicas data public audit scheme
    Yang, Xiaodong
    Pei, Xizhen
    Li, Ting
    Liu, Rui
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 711 - 714
  • [33] An efficient identity-based QER cryptographic scheme
    Chandrashekhar Meshram
    P. L. Powar
    Complex & Intelligent Systems, 2016, 2 (4) : 285 - 291
  • [35] Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
    Shao, Bilin
    Zhang, Li
    Bian, Genqing
    ELECTRONICS, 2023, 12 (06)
  • [36] An identity-based online/offline secure cloud storage auditing scheme
    Rabaninejad, Reyhaneh
    Asaar, Maryam Rajabzadeh
    Attari, Mahmoud Ahmadian
    Aref, Mohammad Reza
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 1455 - 1468
  • [37] An identity-based online/offline secure cloud storage auditing scheme
    Reyhaneh Rabaninejad
    Maryam Rajabzadeh Asaar
    Mahmoud Ahmadian Attari
    Mohammad Reza Aref
    Cluster Computing, 2020, 23 : 1455 - 1468
  • [38] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [39] An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
    Liang, Kaitai
    Liu, Joseph K.
    Wong, Duncan S.
    Susilo, Willy
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 257 - 272
  • [40] Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy
    Zhao, Jining
    Xu, Chunxiang
    Chen, Kefei
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 121 - 137