4.7 Article

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

期刊

IEEE TRANSACTIONS ON SERVICES COMPUTING
卷 14, 期 1, 页码 71-81

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2018.2789893

关键词

Cloud computing; Servers; Protocols; Authentication; Cryptography; Remote data checking; cloud storage; certificateless signature; data shared in group

资金

  1. National Natural Science Foundation of China [U1736112, 61772009, 61672207]
  2. Jiangsu Provincial Natural Science Foundation of China [BK20161511]
  3. Priority Academic Program Development of Jiangsu Higher Education Institutions
  4. Fundamental Research Funds for the Central Universities [2016B10114]
  5. Jiangsu Key Laboratory of Big Data Security& Intelligent Processing, NJUPT

向作者/读者索取更多资源

Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.
Cloud storage service supplies people with an efficient method to share data within a group. The cloud server is not trustworthy, so lots of remote data possession checking (RDPC) protocols are proposed and thought to be an effective way to ensure the data integrity. However, most of RDPC protocols are based on the mechanism of traditional public key infrastructure (PKI), which has obvious security flaw and bears big burden of certificate management. To avoid this shortcoming, identity-based cryptography (IBC) is often chosen to be the basis of RDPC. Unfortunately, IBC has an inherent drawback of key escrow. To solve these problems, we utilize the technique of certificateless signature to present a new RDPC protocol for checking the integrity of data shared among a group. In our scheme, user's private key includes two parts: a partial key generated by the group manager and a secret value chosen by herself/himself. To ensure the right public keys are chosen during the data integrity checking, the public key of each user is associated with her unique identity, for example the name or telephone number. Thus, the certificate is not needed and the problem of key escrow is eliminated too. Meanwhile, the data integrity can still be audited by public verifier without downloading the whole data. In addition, our scheme also supports efficient user revocation from the group. The security of our scheme is reduced to the assumptions of computational Diffie-Hellman (CDH) and discrete logarithm (DL). Experiment results exhibit that the new protocol is very efficient and feasible.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据