Provable Data Possession Schemes from Standard Lattices for Cloud Computing

被引:2
|
作者
Luo, Fucai [1 ]
Al-Kuwari, Saif [1 ,2 ]
Lin, Changlu [3 ]
Wang, Fuqun [4 ,5 ]
Chen, Kefei [4 ,5 ]
机构
[1] Hamad Bin Khalifa Univ, Coll Sci & Engn, Doha, Qatar
[2] Qatar Univ, Kindi Comp Res Ctr, Doha, Qatar
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou, Peoples R China
[4] Hangzhou Normal Univ, Dept Math, Hangzhou, Peoples R China
[5] Westone Cryptol Res Ctr, Beijing, Peoples R China
来源
COMPUTER JOURNAL | 2022年 / 65卷 / 12期
基金
中国国家自然科学基金;
关键词
Provable data possession; cloud storage; quantum attacks; leveled fully homomorphic signature; small integer solution; HOMOMORPHIC SIGNATURES; RETRIEVABILITY; VERIFICATION; PROOF; INTEGRITY; PROTOCOL;
D O I
10.1093/comjnl/bxab190
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Provable Data Possession (PDP) is of crucial importance in public cloud storage since it allows users to check the integrity of their outsourced data without downloading it. However, the existing PDP schemes, which are based on classical number-theoretic assumptions, are insecure under quantum attacks. In this paper, we propose the first PDP scheme from standard lattices, using a specific leveled fully homomorphic signature (FHS) scheme. To remove the complex key management of PDP cryptosystem on the public key infrastructure (PKI) setting, we employ a specific leveled identity-based (ID-based) FHS scheme to construct the first ID-based PDP scheme from standard lattices. Our two PDP schemes are secure under the standard small integer solution (SIS) assumption, which is conjectured to withstand quantum attacks. Furthermore, we conduct experimental evaluations to validate the feasibility of the proposed PDP schemes in practice.
引用
收藏
页码:3223 / 3239
页数:17
相关论文
共 50 条
  • [11] Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
    Liu, Yudong
    Wang, Xu An
    Cao, Yunfei
    Tang, Dianhua
    Yang, Xiaoyuan
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 445 - 452
  • [12] Provable Data Possession of Resource-Constrained Mobile Devices in Cloud Computing
    Yang, Jian
    Wang, Haihang
    Wang, Jian
    Tan, Chengxiang
    Yu, Dingguo
    Journal of Networks, 2011, 6 (07) : 1033 - 1040
  • [13] New provable data transfer from provable data possession and deletion for secure cloud storage
    Liu, Yudong
    Xiao, Shuai
    Wang, Han
    Wang, Xu An
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04)
  • [14] A Survey on Provable Data Possession in Cloud Storage
    Thangavel, M.
    Varalakshmi, P.
    Sindhuja, R.
    Sridhar, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 25 - 31
  • [15] A Provable Data Possession Scheme with Data Hierarchy in Cloud
    Lin, Changlu
    Luo, Fucai
    Wang, Huaxiong
    Zhu, Yan
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 301 - 321
  • [16] Provable multiple-replica dynamic data possession for big data storage in cloud computing
    Hou, Huiying
    Yu, Jia
    Hao, Rong
    International Journal of Network Security, 2018, 20 (03) : 575 - 584
  • [17] Revisiting "online/offline provable data possession"schemes
    Wang, Feng
    Lin, Changlu
    Yuan, Manli
    COMPUTER STANDARDS & INTERFACES, 2025, 91
  • [18] Oriented Group Provable Data Possession in Public Cloud
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 775 - 778
  • [19] A delayed-update Provable Data Possession in the Cloud
    Wang, Huifeng
    Li, Zhanhuai
    Zhang, Xiao
    Sun, Jian
    He, Qinlu
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND COMMUNICATIONS (SCAC), 2014, : 96 - 101
  • [20] PDPMT: Provable Data Possession for Multiple Cloud Tenants
    Huang, Daoli
    Wan, Changsheng
    2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,