Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited

被引:19
|
作者
Ji, Yanyan [1 ]
Shao, Bilin [1 ]
Chang, Jinyong [2 ]
Bian, Genqing [2 ]
机构
[1] XiAn Univ Architecture & Technol, Sch Management, Xian 710055, Shaanxi, Peoples R China
[2] XiAn Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Data storage; Certificateless PDP; Privacy-preserving; Data integrity; SIGNATURE;
D O I
10.1016/j.amc.2020.125478
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Certificateless provable data possession (CL-PDP) protocol is an important tool to check the integrity of data outsourced to cloud service provider (CSP) since it is not necessary to consider the certificate management and key escrow problems. In 2017, He et al. proposed an efficient CL-PDP protocol (HKWWC-protocol, for short) with an additional good property: Privacy protection from the verifier [AppL Math. Comput., vol. 314, pp. 31-43]. However, recently, Liao et al. illustrates that the HKWWC-protocol is completely insecure under their suggested attack (LLON-attack) since CSP can return a forged proof that is able to pass the verification of the verifier, which shows that the HKWWC-protocol will become completely useless. In this paper, we revisit the original HKWWC-protocol and try to rescue it. After our modification, the twisted new protocol can be immune to the LLON-attack. More importantly, we find that the original He et al.'s security model cannot depict the practical scene at all because they viewed CSP and KGC (key generation center) as one entity in their system. Hence, we redefine a new security model and prove the twisted HKWWC-protocol is secure under our new security model. Performance analysis shows that our proposed protocol is still efficient and practical. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment
    Imene Bouleghlimat
    Souheila Boudouda
    Salima Hacini
    Arabian Journal for Science and Engineering, 2024, 49 : 3225 - 3239
  • [22] PPSecS: Privacy-Preserving Secure Big Data Storage in a Cloud Environment
    Bouleghlimat, Imene
    Boudouda, Souheila
    Hacini, Salima
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024, 49 (03) : 3225 - 3239
  • [23] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [24] A Provable Data Possession Scheme with Data Hierarchy in Cloud
    Lin, Changlu
    Luo, Fucai
    Wang, Huaxiong
    Zhu, Yan
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 301 - 321
  • [25] Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems
    He, Debiao
    Kumar, Neeraj
    Zeadally, Sherali
    Wang, Huaqun
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (03) : 1232 - 1241
  • [26] Privacy-Preserving Deep Learning on Big Data in Cloud
    Fan, Yongkai
    Zhang, Wanyu
    Bai, Jianrong
    Lei, Xia
    Li, Kuanching
    CHINA COMMUNICATIONS, 2023, 20 (11) : 176 - 186
  • [27] Privacy-Preserving Deep Learning on Big Data in Cloud
    Yongkai Fan
    Wanyu Zhang
    Jianrong Bai
    Xia Lei
    Kuanching Li
    China Communications, 2023, 20 (11) : 176 - 186
  • [28] Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
    Liu, Hongyu
    Chen, Leiting
    Davar, Zahra
    Pour, Mohammad Ramezanian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 473 - 482
  • [29] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    Yang Zhen
    Wang Wenyu
    Huang Yongfeng
    Li Xing
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 179 - 187
  • [30] A Survey on Provable Data Possession in Cloud Storage
    Thangavel, M.
    Varalakshmi, P.
    Sindhuja, R.
    Sridhar, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 25 - 31