Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case

被引:14
作者
Bian, Genqing [1 ,2 ]
Chang, Jinyong [1 ]
机构
[1] Xian Univ Architecture & Technol, Sch Management, Xian 710055, Peoples R China
[2] Xian Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Peoples R China
基金
中国国家自然科学基金;
关键词
Data storage; certificateless PDP; multi-copy-multi-cloud; data integrity; DATA-STORAGE;
D O I
10.1109/ACCESS.2020.2999208
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For user's extremely important data, storing multiple copies on cloud(s) may be a good option because even if the integrity of one or more copies is broken, it can still recover data from other intact ones, which increases the availability and durability of the outsourced data. Some provable data possession (PDP) protocols guaranteeing the integrity of multi-copies had been proposed in the past years. But almost all of them considered storing multi-copies to single cloud, and the necessary management of certificates as well as the dependence on PKI greatly decrease their efficiencies. Therefore, in recent work, Li et al. proposed an identity-based PDP protocol, which not only avoids the tedious certificates and PKI, but also supports muiti-copies stored on multi-clouds. However, it is well-known that identity-based protocols suffer from the key-escrow attack. In this paper, we consider the certificateless multi-copy-multi-cloud protocol. Specifically, we first present its security model and then construct a concrete protocol, whose security can be proven under the classical CDH assumption. Finally, the performance analysis demonstrates that our protocol yields better efficiency and hence is practical.
引用
收藏
页码:102958 / 102970
页数:13
相关论文
共 27 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]   Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].
Barsoum, Ayad F. ;
Hasan, M. Anwar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :485-497
[5]   RKA Security for Identity-Based Signature Scheme [J].
Chang, Jinyong ;
Wang, Huiqun ;
Wang, Fei ;
Zhang, Anling ;
Ji, Yanyan .
IEEE ACCESS, 2020, 8 :17833-17841
[6]   General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding [J].
Chang, Jinyong ;
Ji, Yanyan ;
Xu, Maozhi ;
Xue, Rui .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 :416-425
[7]  
Galindo D, 2009, LECT NOTES COMPUT SC, V5580, P135, DOI 10.1007/978-3-642-02384-2_9
[8]   A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability [J].
Hao, Zhuo ;
Zhong, Sheng ;
Yu, Nenghai .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1432-1437
[9]   Privacy-preserving certificateless provable data possession scheme for big data storage on cloud [J].
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Wang, Lina ;
Choo, Kim-Kwang Raymond .
APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 :31-43
[10]   Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks [J].
He, Debiao ;
Zeadally, Sherali ;
Wu, Libing .
IEEE SYSTEMS JOURNAL, 2018, 12 (01) :64-73