A new publicly verifiable data possession on remote storage

被引:9
|
作者
Tang, Chun-ming [1 ]
Zhang, Xiao-jun [1 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 01期
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud; Public authentication; Verifiable data possession; Integrity; PLAINTEXT-AWARE; ENCRYPTION; SECURE;
D O I
10.1007/s11227-015-1556-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new verifiable data possession construction supporting both private and public verifiability simultaneously is proposed from a linearly homomorphic cryptography method, which allows a server to integrate l selected block-tag pairs into a single block-tag pair as a response to user's query. In our scheme, the data owner who uses the private verification and anyone else who runs the public verification algorithm simultaneously on the same set of meta-data and based on the same setup procedure can securely authenticate the integrity of client's data file stored at cloud server without retrieving the whole original data file. Besides, in fact our simultaneous privately and publicly verifiable scheme can also be adjusted to elliptic curve group. The scheme proposed is efficient on both client and server sides, especially in computation on cloud server side, which is almost optimal among those existing publicly verifiable schemes. Here the server needs not to perform any exponent operations at all, which greatly reduces client's waiting time. Finally, we make the security analysis of our scheme under several cryptographic assumptions, such as difficulty of Factorization Assumption and Discrete Logarithm Problem (DLP).
引用
收藏
页码:77 / 91
页数:15
相关论文
共 50 条
  • [21] A New, Publicly Verifiable, Secret Sharing Scheme
    Behnad, A.
    Eghlidos, T.
    SCIENTIA IRANICA, 2008, 15 (02) : 246 - 251
  • [22] New Publicly Verifiable Databases with Efficient Updates
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Ma, Jianfeng
    Lou, Wenjing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 546 - 556
  • [23] A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing
    Kumar, P. Syam
    Ashok, Marie Stanislas
    Subramanian, R.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2012, 2 (03) : 1 - 25
  • [24] A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Han, Jinguang
    Zhang, Yichen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 78 - 88
  • [25] Publicly verifiable secure communication with user and data privacy
    Yao Z.
    Mu Y.
    Personal and Ubiquitous Computing, 2022, 26 (03): : 863 - 879
  • [26] PERMANENT: Publicly Verifiable Remote Attestation for Internet of Things Through Blockchain
    Ankergard, Sigurd Frej Joel Jorgensen
    Dushku, Edlira
    Dragoni, Nicola
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 218 - 234
  • [27] Publicly verifiable ciphertexts
    Nieto, Juan
    Manulis, Mark
    Poettering, Bertram
    Rangasamy, Jothi
    Stebila, Douglas
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (05) : 749 - 778
  • [28] New publicly verifiable computation for batch matrix multiplication
    Zhang, Xiaoyu
    Jiang, Tao
    Li, Kuan-Ching
    Castiglione, Aniello
    Chen, Xiaofeng
    INFORMATION SCIENCES, 2019, 479 : 664 - 678
  • [29] New Publicly Verifiable Databases Supporting Insertion Operation
    Miao, Meixia
    Wang, Jianfeng
    Ma, Jianfeng
    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 640 - 642
  • [30] New Publicly Verifiable Computation for Batch Matrix Multiplication
    Zhang, Xiaoyu
    Jiang, Tao
    Li, Kuan-Ching
    Chen, Xiaofeng
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 53 - 65