A new publicly verifiable data possession on remote storage

被引:9
|
作者
Tang, Chun-ming [1 ]
Zhang, Xiao-jun [1 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 01期
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud; Public authentication; Verifiable data possession; Integrity; PLAINTEXT-AWARE; ENCRYPTION; SECURE;
D O I
10.1007/s11227-015-1556-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new verifiable data possession construction supporting both private and public verifiability simultaneously is proposed from a linearly homomorphic cryptography method, which allows a server to integrate l selected block-tag pairs into a single block-tag pair as a response to user's query. In our scheme, the data owner who uses the private verification and anyone else who runs the public verification algorithm simultaneously on the same set of meta-data and based on the same setup procedure can securely authenticate the integrity of client's data file stored at cloud server without retrieving the whole original data file. Besides, in fact our simultaneous privately and publicly verifiable scheme can also be adjusted to elliptic curve group. The scheme proposed is efficient on both client and server sides, especially in computation on cloud server side, which is almost optimal among those existing publicly verifiable schemes. Here the server needs not to perform any exponent operations at all, which greatly reduces client's waiting time. Finally, we make the security analysis of our scheme under several cryptographic assumptions, such as difficulty of Factorization Assumption and Discrete Logarithm Problem (DLP).
引用
收藏
页码:77 / 91
页数:15
相关论文
共 50 条
  • [1] A new publicly verifiable data possession on remote storage
    Chun-ming Tang
    Xiao-jun Zhang
    The Journal of Supercomputing, 2019, 75 : 77 - 91
  • [2] Security analysis of a publicly verifiable data possession scheme for remote storage
    Zhiyan Xu
    Libing Wu
    Debiao He
    Muhammad Khurram Khan
    The Journal of Supercomputing, 2017, 73 : 4923 - 4930
  • [3] Security analysis of a publicly verifiable data possession scheme for remote storage
    Xu, Zhiyan
    Wu, Libing
    He, Debiao
    Khan, Muhammad Khurram
    JOURNAL OF SUPERCOMPUTING, 2017, 73 (11): : 4923 - 4930
  • [4] Publicly Verifiable Remote Data Integrity
    Zeng, Ke
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 419 - 434
  • [5] New publicly verifiable data deletion supporting efficient tracking for cloud storage
    Yang, Changsong
    Tao, Xiaoling
    Chen, Qiyu
    Yang, Changsong (csyang02@163.com); Tao, Xiaoling (txl@guet.deu.cn), 1600, Femto Technique Co., Ltd. (22): : 885 - 896
  • [6] Publicly verifiable data transfer and deletion scheme for cloud storage
    Yang, Changsong
    Tao, Xiaoling
    Zhao, Feng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (10)
  • [7] Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
    Hanser, Christian
    Slamanig, Daniel
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 15 - 26
  • [8] Secure data stream outsourcing with publicly verifiable integrity in cloud storage
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Wang, Qiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 49
  • [9] Data dynamics for remote data possession checking in cloud storage
    Chen, Lanxiang
    Zhou, Shuming
    Huang, Xinyi
    Xu, Li
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2413 - 2424
  • [10] Blockchain-based publicly verifiable data deletion scheme for cloud storage
    Yang, Changsong
    Chen, Xiaofeng
    Xiang, Yang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 : 185 - 193