Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited

被引:19
|
作者
Ji, Yanyan [1 ]
Shao, Bilin [1 ]
Chang, Jinyong [2 ]
Bian, Genqing [2 ]
机构
[1] XiAn Univ Architecture & Technol, Sch Management, Xian 710055, Shaanxi, Peoples R China
[2] XiAn Univ Architecture & Technol, Sch Informat & Control Engn, Xian 710055, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Data storage; Certificateless PDP; Privacy-preserving; Data integrity; SIGNATURE;
D O I
10.1016/j.amc.2020.125478
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Certificateless provable data possession (CL-PDP) protocol is an important tool to check the integrity of data outsourced to cloud service provider (CSP) since it is not necessary to consider the certificate management and key escrow problems. In 2017, He et al. proposed an efficient CL-PDP protocol (HKWWC-protocol, for short) with an additional good property: Privacy protection from the verifier [AppL Math. Comput., vol. 314, pp. 31-43]. However, recently, Liao et al. illustrates that the HKWWC-protocol is completely insecure under their suggested attack (LLON-attack) since CSP can return a forged proof that is able to pass the verification of the verifier, which shows that the HKWWC-protocol will become completely useless. In this paper, we revisit the original HKWWC-protocol and try to rescue it. After our modification, the twisted new protocol can be immune to the LLON-attack. More importantly, we find that the original He et al.'s security model cannot depict the practical scene at all because they viewed CSP and KGC (key generation center) as one entity in their system. Hence, we redefine a new security model and prove the twisted HKWWC-protocol is secure under our new security model. Performance analysis shows that our proposed protocol is still efficient and practical. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    YANG Zhen
    WANG Wenyu
    HUANG Yongfeng
    LI Xing
    ChineseJournalofElectronics, 2019, 28 (01) : 179 - 187
  • [32] P3DP: privacy preserving provable data possession with multi-copy and data dynamics in a cloud storage
    Deng, Zuojie
    Zhou, Jingli
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (02) : 1065 - 1078
  • [33] Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage
    Zhao, Yubo
    Chang, Jinyong
    COMPUTER NETWORKS, 2022, 216
  • [34] Certificateless Provable Data Possession Scheme for Cloud-Based Electronic Health Records System
    Wu, Yujie
    Tan, Xiao
    Xie, Qi
    MATHEMATICS, 2024, 12 (24)
  • [35] A Possible Solution For Privacy-Preserving Cloud Data Storage
    Paul, Mithun
    Collberg, Christian
    Bambauer, Derek
    2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, : 397 - 403
  • [36] Privacy Preserving Provable Data Possession for Cloud based Electronic Health Record System
    Nayak, Sanjeet Kumar
    Tripathy, Somanath
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 860 - 867
  • [37] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54
  • [38] Privacy-preserving file sharing on cloud storage with certificateless signcryption
    Thorncharoensri, Pairat
    Susilo, Willy
    Chow, Yang-Wai
    THEORETICAL COMPUTER SCIENCE, 2022, 916 : 1 - 21
  • [39] Provable multiple-replica dynamic data possession for big data storage in cloud computing
    Hou, Huiying
    Yu, Jia
    Hao, Rong
    International Journal of Network Security, 2018, 20 (03) : 575 - 584
  • [40] Load Balancing for Privacy-Preserving Access to Big Data in Cloud
    Li, Peng
    Guo, Song
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 524 - 528