Proxy Provable Data Possession in Public Clouds

被引:157
作者
Wang, Huaqun [1 ,2 ]
机构
[1] Dalian Ocean Univ, Sch Informat Engn, Dalian 116023, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; PPDP; integrity checking; provable security; bilinear pairings; PROOFS;
D O I
10.1109/TSC.2012.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, cloud computing rapidly expands as an alternative to conventional computing due to it can provide a flexible, dynamic and resilient infrastructure for both academic and business environments. In public cloud environment, the client moves its data to public cloud server (PCS) and cannot control its remote data. Thus, information security is an important problem in public cloud storage, such as data confidentiality, integrity, and availability. In some cases, the client has no ability to check its remote data possession, such as the client is in prison because of committing crime, on the ocean-going vessel, in the battlefield because of the war, and so on. It has to delegate the remote data possession checking task to some proxy. In this paper, we study proxy provable data possession (PPDP). In public clouds, PPDP is a matter of crucial importance when the client cannot perform the remote data possession checking. We study the PPDP system model, the security model, and the design method. Based on the bilinear pairing technique, we design an efficient PPDP protocol. Through security analysis and performance analysis, our protocol is provable secure and efficient.
引用
收藏
页码:551 / 559
页数:9
相关论文
共 29 条
[1]  
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Barsoum A.F., 2013, PROVABLE POSSESSION
[4]  
Barsoum A. F., 2013, P IEEE INFOCOM
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Boneh D., 2001, INT C THEORY APPL CR, V2248, P514, DOI 10.1007/3-540-45682-130
[7]  
Bowers KevinD., 2009, Proc. of ACM-CCSW '09, P43, DOI DOI 10.1145/1655008.1655015
[8]   MR-PDP: Multiple-Replica Provable Data Possession [J].
Curtmola, Reza ;
Khan, Osama ;
Burns, Randal ;
Ateniese, Giuseppe .
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, :411-+
[9]  
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
[10]  
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213