A secure data sharing scheme with cheating detection based on Chaum-Pedersen protocol for cloud storage

被引:4
作者
Wang, Xin [1 ,2 ,3 ]
Yang, Bo [1 ,3 ]
Xia, Zhe [4 ]
Hou, Hong-xia [1 ,3 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Shaanxi, Peoples R China
[2] Shaanxi Univ Sci & Technol, Sch Elect Informat & Artificial Intelligence, Xian 710021, Shaanxi, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Wuhan Univ Technol, Sch Comp Sci & Technol, Wuhan 430070, Hubei, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Data sharing; Chaum-Pedersen proof; Cheating detection; Cloud storage; DIFFERENTIALLY PRIVATE DATA;
D O I
10.1631/FITEE.1800066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing technology, data can be outsourced to the cloud and conveniently shared among users. However, in many circumstances, users may have concerns about the reliability and integrity of their data. It is crucial to provide data sharing services that satisfy these security requirements. We introduce a reliable and secure data sharing scheme, using the threshold secret sharing technique and the Chaum-Pedersen zero-knowledge proof. The proposed scheme is not only effective and flexible, but also able to achieve the semantic security property. Moreover, our scheme is capable of ensuring accountability of users' decryption keys as well as cheater identification if some users behave dishonestly. The efficiency analysis shows that the proposed scheme has a better performance in terms of computational cost, compared with the related work. It is particularly suitable for application to protect users' medical insurance data over the cloud.
引用
收藏
页码:787 / 800
页数:14
相关论文
共 21 条
[1]  
[Anonymous], IMPER J INT RES
[2]  
[Anonymous], INT C FIN CRYPT
[3]  
[Anonymous], IEEE T BIG DATA
[4]  
[Anonymous], INT J ENG RES TECHNO
[5]  
[Anonymous], ADV INFORM COMPUTER
[6]  
[Anonymous], IEEE T DEPEND SECUR
[7]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[8]  
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[9]   Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing [J].
Dong, Xin ;
Yu, Jiadi ;
Luo, Yuan ;
Chen, Yingying ;
Xue, Guangtao ;
Li, Minglu .
COMPUTERS & SECURITY, 2014, 42 :151-164
[10]  
Hoshino H, 2016, INT SYMPOS COMPUT NE, P623, DOI [10.1109/CANDAR.2016.0112, 10.1109/CANDAR.2016.85]