Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited

被引:19
|
作者
Ji, Yanyan [1 ]
Shao, Bilin [1 ]
Chang, Jinyong [2 ]
Bian, Genqing [2 ]
机构
[1] XiAn Univ Architecture & Technol, Sch Management, Xian 710055, Shaanxi, Peoples R China
[2] XiAn Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Data storage; Certificateless PDP; Privacy-preserving; Data integrity; SIGNATURE;
D O I
10.1016/j.amc.2020.125478
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Certificateless provable data possession (CL-PDP) protocol is an important tool to check the integrity of data outsourced to cloud service provider (CSP) since it is not necessary to consider the certificate management and key escrow problems. In 2017, He et al. proposed an efficient CL-PDP protocol (HKWWC-protocol, for short) with an additional good property: Privacy protection from the verifier [AppL Math. Comput., vol. 314, pp. 31-43]. However, recently, Liao et al. illustrates that the HKWWC-protocol is completely insecure under their suggested attack (LLON-attack) since CSP can return a forged proof that is able to pass the verification of the verifier, which shows that the HKWWC-protocol will become completely useless. In this paper, we revisit the original HKWWC-protocol and try to rescue it. After our modification, the twisted new protocol can be immune to the LLON-attack. More importantly, we find that the original He et al.'s security model cannot depict the practical scene at all because they viewed CSP and KGC (key generation center) as one entity in their system. Hence, we redefine a new security model and prove the twisted HKWWC-protocol is secure under our new security model. Performance analysis shows that our proposed protocol is still efficient and practical. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Privacy-Preserving Access Control Model for Big Data Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 130 - 135
  • [42] Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud
    Zhang, Lei
    Meng, Xinyu
    Choo, Kim-Kwang Raymond
    Zhang, Yuanfei
    Dai, Feifei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 634 - 647
  • [43] PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing
    Xu, Yan
    Ding, Long
    Cui, Jie
    Zhong, Hong
    Yu, Jia
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3730 - 3739
  • [44] An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in Cloud
    Sun, Yi
    Liu, Qian
    Chen, Xingyuan
    Du, Xuehui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3295 - 3310
  • [45] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [46] Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
    Liu, Yudong
    Wang, Xu An
    Cao, Yunfei
    Tang, Dianhua
    Yang, Xiaoyuan
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 445 - 452
  • [47] A secure privacy-preserving cloud auditing scheme with data deduplication
    Li, Chen
    Liu, Zhenhua
    International Journal of Network Security, 2019, 21 (02) : 199 - 210
  • [48] An Efficient and Certificateless Conditional Privacy-Preserving Authentication Scheme for Wireless Body Area Networks Big Data Services
    Ji, Sai
    Gui, Ziyuan
    Zhou, Tianqi
    Yan, Hongyang
    Shen, Jian
    IEEE ACCESS, 2018, 6 : 69603 - 69611
  • [49] Group provable data possession with deduplication in cloud storage
    Wang H.-Y.
    Zhu L.-H.
    Li L.-Y.-J.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1417 - 1431