A collusion-resistant certificateless provable data possession scheme for shared data with user revocation

被引:2
|
作者
Yang, Guang [1 ,2 ]
Han, Lidong [1 ,2 ]
Bi, Jingguo [3 ]
Wang, Fuqun [1 ,2 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, 2318 Yuhangtang Rd, Hangzhou 311121, Zhejiang, Peoples R China
[2] Hangzhou Normal Univ, Sch Informat Sci & Technol, 2318 Yuhangtang Rd, Hangzhou 311121, Zhejiang, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, 10 Xitucheng Rd, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Provable data possession; User revocation; Cloud storage; Shared data integrity; Collusion resistance; Certificateless; CLOUD DATA; EFFICIENT;
D O I
10.1007/s10586-023-04078-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues, one of which is that the cloud server may cheat users for a good reputation when the data is lost. A classical solution to deal with it is provable data possession (PDP) protocols. Most of PDP protocols are relied on either the public key infrastructure or identity-based cryptography. However, certificate management and key escrow issues place a significant burden on this. Furthermore, revoking the group's illegal users is a critical issue for PDP schemes. To address these problems, we put forward a certificateless PDP scheme for shared data with user revocation. Our proposed scheme not only achieves efficient user revocation but also withstands collusion attack. We also give a formal proof of security of our proposed scheme without random oracle model. Experimental results and analysis show that our scheme is quite effective in data auditing, verification, and user revocation.
引用
收藏
页码:2165 / 2179
页数:15
相关论文
共 50 条
  • [31] Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage
    Gudeme, Jaya Rao
    Pasupuleti, Syamkumar
    Kandukuri, Ramesh
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 156 : 163 - 175
  • [32] Secure and collusion-resistant data aggregation from convertible tags
    Leontiadis, Iraklis
    Li, Ming
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (01) : 1 - 20
  • [33] Secure and collusion-resistant data aggregation from convertible tags
    Iraklis Leontiadis
    Ming Li
    International Journal of Information Security, 2021, 20 : 1 - 20
  • [34] CRUPA: collusion resistant user revocable public auditing of shared data in cloud
    Mara, Geeta C.
    Rathod, Usharani
    Raju, Shreyas R. G.
    Raghavendra, S.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [35] CRUPA: collusion resistant user revocable public auditing of shared data in cloud
    Geeta C. Mara
    Usharani Rathod
    Shreyas Raju R. G.
    Raghavendra S.
    Rajkumar Buyya
    Venugopal K. R.
    S. S. Iyengar
    L. M. Patnaik
    Journal of Cloud Computing, 9
  • [36] Access Privilege Elevation and Revocation in Collusion-Resistant Cloud Access Control
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 209 - 214
  • [37] Collusion-resistant video fingerprinting for large user group
    He, Shan
    Wu, Min
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2301 - +
  • [38] An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics
    Deng, Zuojie
    Chen, Shuhong
    Tan, Xiaolan
    Song, Dan
    Wu, Fan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 392 - 402
  • [39] An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage
    Yao, Ge
    Li, Yong
    Lei, Linan
    Wang, Huaqun
    Lin, Changlu
    GREEN, PERVASIVE, AND CLOUD COMPUTING, 2016, 9663 : 63 - 81
  • [40] An Identity-Set-Based Provable Data Possession Scheme
    Lin, Changlu
    Luo, Fucai
    Luo, Jinglong
    Liu, Yali
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 606 - 618