Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage

被引:20
作者
Ni, Jianbing [1 ]
Zhang, Kuan [2 ]
Yu, Yong [3 ]
Yang, Tingting [4 ]
机构
[1] Queens Univ, Dept Elect & Comp Engn, Kingston, ON K7L 2N6, Canada
[2] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Omaha, NE 68182 USA
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Shaanxi, Peoples R China
[4] Dongguan Univ Technol, Sch Elect Engn & Amp Intelligentizat, Dongguan 523000, Guangdong, Peoples R China
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会; 国家重点研发计划;
关键词
Secure cloud storage; provable data possession; cloud data auditing; RSA assumption; identity-based cryptography; OUTSOURCED DATA;
D O I
10.1109/TDSC.2020.3036641
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud storage services have become popular nowadays, the integrity of outsourced data stored at untrusted servers received increased attention. Provable data possession (PDP) provides an effective and efficient solution for cloud data integrity by asking the cloud server to prove that the stored data are not tampered with or maliciously discarded without returning the actual data to users. In this article, we propose an efficient identity-based privacy-preserving provable data possession scheme (ID-(PDP)-D-3) based on the RSA assumption for secure cloud storage. In ID-(PDP)-D-3, a cloud user takes the outsourcing file and a global parameter in a time period as inputs to generate identity-based homomorphic authenticators, and any third-party auditor (TPA) can check the integrity of the outsourced file by verifying the validity of homomorphic authenticators. The distinguished feature of ID-(PDP)-D-3 is to support the aggregation of identity-based homomorphic authenticators generated by different users under the RSA assumption, which is an open problem in provable data possession. Specifically, we transfer the identity-based homomorphic authenticators generated in distinct time periods into those with the same period parameter, and the cloud can compress the homomorphic authenticators of different users to generate a data possession proof for integrity verification. Besides, by exploiting zero-knowledge proof, the leakage of outsourced data to TPA can be prevented. The soundness of ID-(PDP)-D-3 is proved based on the RSA assumption, and the privacy against TPA is perfectly preserved. Finally, we demonstrate ID-(PDP)-D-3 is more efficient on integrity verification than the existing BLS-based schemes, and cross-user aggregate verification can significantly reduce computational and communication overhead for TPA.
引用
收藏
页码:1753 / 1769
页数:17
相关论文
共 62 条
[1]  
[Anonymous], 2010, Top Threats to Cloud Computing V1.0
[2]   From Security to Assurance in the Cloud: A Survey [J].
Ardagna, Claudio A. ;
Asal, Rasool ;
Damiani, Ernesto ;
Quang Hieu Vu .
ACM COMPUTING SURVEYS, 2015, 48 (01)
[3]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[4]  
Ashford W., 2015, Google warns of fake digital certificates
[5]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]  
Bellare M, 2007, LECT NOTES COMPUT SC, V4377, P145
[7]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[8]   Security Concerns in Popular Cloud Storage Services [J].
Chu, Cheng-Kang ;
Zhu, Wen-Tao ;
Han, Jin ;
Liu, Joseph K. ;
Xu, Jia ;
Zhou, Jianying .
IEEE PERVASIVE COMPUTING, 2013, 12 (04) :50-57
[9]  
Cramer R., 2000, ACM Transactions on Information and Systems Security, V3, P161, DOI 10.1145/357830.357847
[10]   Dynamic Provable Data Possession [J].
Erway, C. Chris ;
Kupcu, Alptekin ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)