A collusion-resistant certificateless provable data possession scheme for shared data with user revocation

被引:2
|
作者
Yang, Guang [1 ,2 ]
Han, Lidong [1 ,2 ]
Bi, Jingguo [3 ]
Wang, Fuqun [1 ,2 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, 2318 Yuhangtang Rd, Hangzhou 311121, Zhejiang, Peoples R China
[2] Hangzhou Normal Univ, Sch Informat Sci & Technol, 2318 Yuhangtang Rd, Hangzhou 311121, Zhejiang, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, 10 Xitucheng Rd, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Provable data possession; User revocation; Cloud storage; Shared data integrity; Collusion resistance; Certificateless; CLOUD DATA; EFFICIENT;
D O I
10.1007/s10586-023-04078-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues, one of which is that the cloud server may cheat users for a good reputation when the data is lost. A classical solution to deal with it is provable data possession (PDP) protocols. Most of PDP protocols are relied on either the public key infrastructure or identity-based cryptography. However, certificate management and key escrow issues place a significant burden on this. Furthermore, revoking the group's illegal users is a critical issue for PDP schemes. To address these problems, we put forward a certificateless PDP scheme for shared data with user revocation. Our proposed scheme not only achieves efficient user revocation but also withstands collusion attack. We also give a formal proof of security of our proposed scheme without random oracle model. Experimental results and analysis show that our scheme is quite effective in data auditing, verification, and user revocation.
引用
收藏
页码:2165 / 2179
页数:15
相关论文
共 50 条
  • [1] A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
    Guang Yang
    Lidong Han
    Jingguo Bi
    Fuqun Wang
    Cluster Computing, 2024, 27 : 2165 - 2179
  • [2] Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud
    Liao, Yongjian
    Liang, Yikuan
    Oyewole, Adeniyi Wisdom
    Nie, Xuyun
    IEEE ACCESS, 2019, 7 : 93259 - 93263
  • [3] A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs
    Shen, Jiayan
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    Li, Chengju
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1156 - 1168
  • [4] Verification of Multi-Owner Shared Data with Collusion Resistant User Revocation in Cloud
    Kasunde, Dipali S.
    Manjrekar, A. A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [5] Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Wang, Bo
    Wang, Tao
    Feng, Shuai
    Li, Siwei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3986 - 3998
  • [6] Certificateless Provable Data Possession Scheme Suitable for Smart Grid Management Systems
    Deng, Lunzhi
    Chen, Zhiwei
    Ruan, Yu
    Zhou, Han
    Li, Siwei
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 4245 - 4256
  • [7] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 : 31 - 43
  • [8] Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage
    Yang, Hongbin
    Jiang, Shuxiong
    Shen, Wenfeng
    Lei, Zhou
    FUTURE INTERNET, 2018, 10 (06):
  • [9] Public Possession Checking for Shared Data with User Revocation in Cloud Computing
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    Niu, Xinxin
    Yao, Yuangang
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (06): : 1141 - 1149
  • [10] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    APPLIED MATHEMATICS AND COMPUTATION, 2020, 386