Provable Data Possession Schemes from Standard Lattices for Cloud Computing

被引:2
|
作者
Luo, Fucai [1 ]
Al-Kuwari, Saif [1 ,2 ]
Lin, Changlu [3 ]
Wang, Fuqun [4 ,5 ]
Chen, Kefei [4 ,5 ]
机构
[1] Hamad Bin Khalifa Univ, Coll Sci & Engn, Doha, Qatar
[2] Qatar Univ, Kindi Comp Res Ctr, Doha, Qatar
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou, Peoples R China
[4] Hangzhou Normal Univ, Dept Math, Hangzhou, Peoples R China
[5] Westone Cryptol Res Ctr, Beijing, Peoples R China
来源
COMPUTER JOURNAL | 2022年 / 65卷 / 12期
基金
中国国家自然科学基金;
关键词
Provable data possession; cloud storage; quantum attacks; leveled fully homomorphic signature; small integer solution; HOMOMORPHIC SIGNATURES; RETRIEVABILITY; VERIFICATION; PROOF; INTEGRITY; PROTOCOL;
D O I
10.1093/comjnl/bxab190
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Provable Data Possession (PDP) is of crucial importance in public cloud storage since it allows users to check the integrity of their outsourced data without downloading it. However, the existing PDP schemes, which are based on classical number-theoretic assumptions, are insecure under quantum attacks. In this paper, we propose the first PDP scheme from standard lattices, using a specific leveled fully homomorphic signature (FHS) scheme. To remove the complex key management of PDP cryptosystem on the public key infrastructure (PKI) setting, we employ a specific leveled identity-based (ID-based) FHS scheme to construct the first ID-based PDP scheme from standard lattices. Our two PDP schemes are secure under the standard small integer solution (SIS) assumption, which is conjectured to withstand quantum attacks. Furthermore, we conduct experimental evaluations to validate the feasibility of the proposed PDP schemes in practice.
引用
收藏
页码:3223 / 3239
页数:17
相关论文
共 50 条
  • [41] Designated-Verifier Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 11 - 19
  • [42] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [43] Dynamic Provable Data Possession
    Erway, C. Chris
    Kuepcue, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 213 - 222
  • [44] A Certificate-Based Provable Data Possession Scheme in the Standard Model
    Zhou, Caixue
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [45] EFFICIENT VERIFICATION OF DATA POSSESSION IN CLOUD COMPUTING
    Wu, Songyang
    Zhang, Yong
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 424 - 428
  • [46] Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
    Zhou, Caixue
    Wang, Lihua
    Wang, Lingmin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2022, 18 (04):
  • [47] Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage
    Ni, Jianbing
    Zhang, Kuan
    Yu, Yong
    Yang, Tingting
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1753 - 1769
  • [48] A method for achieving provable data integrity in cloud computing
    Aiping Li
    Shuang Tan
    Yan Jia
    The Journal of Supercomputing, 2019, 75 : 92 - 108
  • [49] A method for achieving provable data integrity in cloud computing
    Li, Aiping
    Tan, Shuang
    Jia, Yan
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (01): : 92 - 108
  • [50] Provable Data Possession Scheme with Constant Proof Size for Outsourced Data in Public Cloud
    Purushothama, B. R.
    Amberker, B. B.
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 1662 - 1667