A collusion-resistant certificateless provable data possession scheme for shared data with user revocation

被引:2
|
作者
Yang, Guang [1 ,2 ]
Han, Lidong [1 ,2 ]
Bi, Jingguo [3 ]
Wang, Fuqun [1 ,2 ]
机构
[1] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, 2318 Yuhangtang Rd, Hangzhou 311121, Zhejiang, Peoples R China
[2] Hangzhou Normal Univ, Sch Informat Sci & Technol, 2318 Yuhangtang Rd, Hangzhou 311121, Zhejiang, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, 10 Xitucheng Rd, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Provable data possession; User revocation; Cloud storage; Shared data integrity; Collusion resistance; Certificateless; CLOUD DATA; EFFICIENT;
D O I
10.1007/s10586-023-04078-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues, one of which is that the cloud server may cheat users for a good reputation when the data is lost. A classical solution to deal with it is provable data possession (PDP) protocols. Most of PDP protocols are relied on either the public key infrastructure or identity-based cryptography. However, certificate management and key escrow issues place a significant burden on this. Furthermore, revoking the group's illegal users is a critical issue for PDP schemes. To address these problems, we put forward a certificateless PDP scheme for shared data with user revocation. Our proposed scheme not only achieves efficient user revocation but also withstands collusion attack. We also give a formal proof of security of our proposed scheme without random oracle model. Experimental results and analysis show that our scheme is quite effective in data auditing, verification, and user revocation.
引用
收藏
页码:2165 / 2179
页数:15
相关论文
共 50 条
  • [41] Security analysis of a certificateless public provable data possession scheme with privacy preserving for cloud-based smart grid data management system
    Zhou, Caixue
    International Journal of Network Security, 2020, 22 (04) : 584 - 588
  • [42] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [43] Dynamic Provable Data Possession
    Erway, C. Chris
    Kuepcue, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 213 - 222
  • [44] A collusion-resistant dynamic key management scheme for WSNs
    Zhan, Furui
    Yao, Nianmin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6351 - 6364
  • [45] A Collusion-Resistant Automation Scheme for Social Moderation Systems
    Lou, Jing-Kai
    Chen, Kuan-Ta
    Lei, Chin-Laung
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 571 - +
  • [46] Collusion-resistant video fingerprinting for large user group
    He, Shan
    Wu, Min
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (04) : 697 - 709
  • [47] Provable Data Possession (PDP) and Proofs of Retrievability (POR) of Current Big User Data
    Ieuan Walker
    Chaminda Hewage
    Ambikesh Jayal
    SN Computer Science, 2022, 3 (1)
  • [48] A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction
    Shen, Xieyang
    Huang, Chuanhe
    Shen, Xiajiong
    Shi, Jiaoli
    Wang, Danxin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [49] Provable Data Possession with Outsourced Data Transfer
    Wang, Huaqun
    He, Debiao
    Fu, Anmin
    Li, Qi
    Wang, Qihua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1929 - 1939
  • [50] Integrity Verification for Shared Data in Group with User Revocation
    Suguna, M.
    Shalinie, S. Mercy
    Sivaranjani, R.
    WIRELESS COMMUNICATION NETWORKS AND INTERNET OF THINGS, VOL VI, 2019, 493 : 41 - 49