Provable Data Possession Schemes from Standard Lattices for Cloud Computing

被引:2
|
作者
Luo, Fucai [1 ]
Al-Kuwari, Saif [1 ,2 ]
Lin, Changlu [3 ]
Wang, Fuqun [4 ,5 ]
Chen, Kefei [4 ,5 ]
机构
[1] Hamad Bin Khalifa Univ, Coll Sci & Engn, Doha, Qatar
[2] Qatar Univ, Kindi Comp Res Ctr, Doha, Qatar
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou, Peoples R China
[4] Hangzhou Normal Univ, Dept Math, Hangzhou, Peoples R China
[5] Westone Cryptol Res Ctr, Beijing, Peoples R China
来源
COMPUTER JOURNAL | 2022年 / 65卷 / 12期
基金
中国国家自然科学基金;
关键词
Provable data possession; cloud storage; quantum attacks; leveled fully homomorphic signature; small integer solution; HOMOMORPHIC SIGNATURES; RETRIEVABILITY; VERIFICATION; PROOF; INTEGRITY; PROTOCOL;
D O I
10.1093/comjnl/bxab190
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Provable Data Possession (PDP) is of crucial importance in public cloud storage since it allows users to check the integrity of their outsourced data without downloading it. However, the existing PDP schemes, which are based on classical number-theoretic assumptions, are insecure under quantum attacks. In this paper, we propose the first PDP scheme from standard lattices, using a specific leveled fully homomorphic signature (FHS) scheme. To remove the complex key management of PDP cryptosystem on the public key infrastructure (PKI) setting, we employ a specific leveled identity-based (ID-based) FHS scheme to construct the first ID-based PDP scheme from standard lattices. Our two PDP schemes are secure under the standard small integer solution (SIS) assumption, which is conjectured to withstand quantum attacks. Furthermore, we conduct experimental evaluations to validate the feasibility of the proposed PDP schemes in practice.
引用
收藏
页码:3223 / 3239
页数:17
相关论文
共 50 条
  • [1] Provable Data Possession in Cloud Computing
    Shuang, Tan
    Zhang Jianfeng
    Chen Zhikun
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1406 - 1413
  • [2] Towards Comprehensive Provable Data Possession in Cloud Computing
    LI Chaoling
    CHEN Yue
    TAN Pengxu
    YANG Gang
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 265 - 271
  • [3] Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
    Barsoum, Ayad F.
    Hasan, M. Anwar
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 485 - 497
  • [4] Hybrid Provable Data Possession at Untrusted Stores In Cloud Computing
    Lee, Narn-Yih
    Chang, Yun-Kuan
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 638 - 645
  • [5] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54
  • [6] Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems"
    Guo, Wei
    Qin, Sujuan
    Gao, Fei
    Zhang, Hua
    Li, Wenmin
    Jin, Zhengping
    Wen, Qiaoyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2584 - 2586
  • [7] Distributed data possession provable in cloud
    Mingxu Yi
    Lifeng Wang
    Jinxia Wei
    Distributed and Parallel Databases, 2017, 35 : 1 - 21
  • [8] Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Wang, Bo
    Wang, Tao
    Feng, Shuai
    Li, Siwei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3986 - 3998
  • [9] Distributed data possession provable in cloud
    Yi, Mingxu
    Wang, Lifeng
    Wei, Jinxia
    DISTRIBUTED AND PARALLEL DATABASES, 2017, 35 (01) : 1 - 21
  • [10] An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing
    Xu, Hongyun
    Jiang, Jiesi
    Xu, Cheng
    SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 371 - 381