Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited

被引:21
作者
Chang, Jinyong [1 ]
Shao, Bilin [2 ]
Ji, Yanyan [2 ]
Bian, Genqing [1 ]
机构
[1] Xian Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Peoples R China
[2] Xian Univ Architecture & Technol, Sch Management, Xian 710055, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Computational modeling; Public key; Computational efficiency; Cloud computing; Servers; Cloud storage; identity-based protocol; multi-copy; multi-cloud;
D O I
10.1109/LCOMM.2020.3013280
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Storing multi-copy of data file on multi-cloud may be useful in some practical contexts. How to ensure the integrity of a user's multi-copy becomes very important in this case. In recent work, Li et al. proposed an efficient "identity-based" auditing protocol (LYZ-protocol, for short) to achieve this goal. The "identity-based" property guarantees that the resulting primitive does not rely on PKI to manage certificates. However, in this letter, we note that the performances of this protocol can be further improved. More precisely, by introducing a new hash function modeled as a random oracle, the communication costs of original LYZ-protocol can be greatly reduced. In addition, the building block of a traditional signature scheme used in this protocol results in the entire protocol not being completely identity-based, and thus it may still bear the burden of managing certificates. Therefore, by replacing this signature with an identity-based scheme, we can obtain a completely identity-based protocol. Finally, the performance analysis shows that the modified LYZ-protocol outperforms the original one.
引用
收藏
页码:2723 / 2727
页数:5
相关论文
共 16 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]   Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].
Barsoum, Ayad F. ;
Hasan, M. Anwar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :485-497
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]   Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding" [J].
Chang, Jinyong ;
Shao, Bilin ;
Ji, Yanyan ;
Bian, Genqing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (11) :2618-2619
[6]   RKA Security for Identity-Based Signature Scheme [J].
Chang, Jinyong ;
Wang, Huiqun ;
Wang, Fei ;
Zhang, Anling ;
Ji, Yanyan .
IEEE ACCESS, 2020, 8 :17833-17841
[7]   General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding [J].
Chang, Jinyong ;
Ji, Yanyan ;
Xu, Maozhi ;
Xue, Rui .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 :416-425
[8]   An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics [J].
Deng, Zuojie ;
Chen, Shuhong ;
Tan, Xiaolan ;
Song, Dan ;
Wu, Fan .
SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 :392-402
[9]  
Galindo D, 2009, LECT NOTES COMPUT SC, V5580, P135, DOI 10.1007/978-3-642-02384-2_9
[10]   Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing [J].
He, Hui ;
Zhang, Weizhe ;
Liu, Chuanyi ;
Sun, Honglei .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) :1108-1121