Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage

被引:17
|
作者
Ming, Yang [1 ]
Shi, Wenchang [1 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian 710064, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Cloud storage; privacy preserving; provable data possession; certificateless cryptography; CHECKING;
D O I
10.1109/ACCESS.2019.2938528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a burgeoning paradigm that offers reliable and adaptive infrastructure to the data owner who shares his data with the data user through the cloud server. In the data sharing process, the integrity of the data stored in the cloud faces serious threats. The provable data possession schemes ensure that a cloud server provider proves to a third party auditor that it is truthfully storing data from the data owner. However, the PKI-based provable data possession scheme suffers the management issue of the certificates and the identity-based provable data possession scheme causes an inherent key escrow problem. In this paper, we put forward an efficient privacy-preserving certificateless provable data possession scheme based on certificateless cryptography and elliptic curve cryptography, which has been proved to be unforgeable against adaptive chosen message attacks in the random oracle model. At the same time, the data integrity can be audited by the third party auditor without downloading the whole data. The proposed scheme gives away no information of the stored data to the third party auditor during the audit phase and the data owner's identity privacy is protected. The experiment results show that the proposed scheme is of efficiency and feasibility as far as computation and communication costs are concerned.
引用
收藏
页码:122091 / 122105
页数:15
相关论文
共 50 条
  • [1] Improved Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
    Li, Xiuguang
    Li, Ruifeng
    Wang, Xu An
    Niu, Ke
    Li, Hui
    Yang, Xiaoyuan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 : 31 - 43
  • [3] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    APPLIED MATHEMATICS AND COMPUTATION, 2020, 386
  • [4] EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage
    Dhakad, Nandini
    Kar, Jayaprakash
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6658 - 6668
  • [5] Revocable certificateless Provable Data Possession with identity privacy in cloud storage
    Zhang, Kai
    Guo, Zirui
    Wang, Liangliang
    Zhang, Lei
    Wei, Lifei
    COMPUTER STANDARDS & INTERFACES, 2024, 90
  • [6] SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (03) : 876 - 888
  • [7] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage"
    Yu, Jia
    Hao, Rong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 2090 - 2092
  • [9] Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Wang, Bo
    Wang, Tao
    Feng, Shuai
    Li, Siwei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3986 - 3998
  • [10] Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage
    Yang, Hongbin
    Jiang, Shuxiong
    Shen, Wenfeng
    Lei, Zhou
    FUTURE INTERNET, 2018, 10 (06):