A new publicly verifiable data possession on remote storage

被引:9
|
作者
Tang, Chun-ming [1 ]
Zhang, Xiao-jun [1 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 01期
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud; Public authentication; Verifiable data possession; Integrity; PLAINTEXT-AWARE; ENCRYPTION; SECURE;
D O I
10.1007/s11227-015-1556-z
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a new verifiable data possession construction supporting both private and public verifiability simultaneously is proposed from a linearly homomorphic cryptography method, which allows a server to integrate l selected block-tag pairs into a single block-tag pair as a response to user's query. In our scheme, the data owner who uses the private verification and anyone else who runs the public verification algorithm simultaneously on the same set of meta-data and based on the same setup procedure can securely authenticate the integrity of client's data file stored at cloud server without retrieving the whole original data file. Besides, in fact our simultaneous privately and publicly verifiable scheme can also be adjusted to elliptic curve group. The scheme proposed is efficient on both client and server sides, especially in computation on cloud server side, which is almost optimal among those existing publicly verifiable schemes. Here the server needs not to perform any exponent operations at all, which greatly reduces client's waiting time. Finally, we make the security analysis of our scheme under several cryptographic assumptions, such as difficulty of Factorization Assumption and Discrete Logarithm Problem (DLP).
引用
收藏
页码:77 / 91
页数:15
相关论文
共 50 条
  • [31] Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem
    Tian, Miaomiao
    Ye, Shibei
    Zhong, Hong
    Chen, Fei
    Gao, Chuang
    Chen, Jie
    IEEE ACCESS, 2019, 7 : 129071 - 129081
  • [32] Improved security of a dynamic remote data possession checking protocol for cloud storage
    Yu, Yong
    Ni, Jianbing
    Au, Man Ho
    Liu, Hongyu
    Wang, Hua
    Xu, Chunxiang
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (17) : 7789 - 7796
  • [33] A hill cipher-based remote data possession checking in cloud storage
    Chen, Lanxiang
    Guo, Gongde
    Peng, Zhen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 511 - 518
  • [34] Remote data possession checking with privacy-preserving authenticators for cloud storage
    Shen, Wenting
    Yang, Guangyang
    Yu, Jia
    Zhang, Hanlin
    Kong, Fanyu
    Hao, Rong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 136 - 145
  • [35] Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage
    Luo Yuchuan
    Fu Shaojing
    Xu Ming
    Wang Dongsheng
    CHINA COMMUNICATIONS, 2014, 11 (11) : 114 - 124
  • [36] Publicly Verifiable Private Aggregation of Time-Series Data
    Bakondi, Bence
    Peter, Andreas
    Everts, Maarten
    Hartel, Pieter
    Jonker, Willem
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 50 - 59
  • [37] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [38] Publicly Verifiable Boolean Query Over Outsourced Encrypted Data
    Jiang, Shunrong
    Zhu, Xiaoyan
    Guo, Linke
    Liu, Jianqing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (03) : 799 - 813
  • [39] Publicly Verifiable Grouped Aggregation Queries on Outsourced Data Streams
    Nath, Suman
    Venkatesan, Ramarathnam
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 517 - 528
  • [40] Hybrid Publicly Verifiable Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 147 - 163