HUANG Longxia, ZHOU Junlong, ZHANG Gongxuan, et al., “Certificateless Public Verification for Data Storage and Sharing in the Cloud,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 639-647, 2020, doi: 10.1049/cje.2020.05.007
Citation: HUANG Longxia, ZHOU Junlong, ZHANG Gongxuan, et al., “Certificateless Public Verification for Data Storage and Sharing in the Cloud,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 639-647, 2020, doi: 10.1049/cje.2020.05.007

Certificateless Public Verification for Data Storage and Sharing in the Cloud

doi: 10.1049/cje.2020.05.007
Funds:  This work is supported by National Science Foundation of China (No.U1736216, No.61802185) and Natural Science Foundation of Jiangsu Province (No.BK20180470).
  • Received Date: 2017-01-06
  • Rev Recd Date: 2019-10-03
  • Publish Date: 2020-07-10
  • By advances in cloud computing, users are allowed to remotely store their data in the cloud, manage the stored data without limitation of time and place, and give rights to visitors that want to access to their data. As may no longer possess data physically, the data owner has to ensure the integrity of the data with the public key given by Public key infrastructure (PKI). However, there are many security risks of the traditional PKI and the certificate management is complex. We utilize elliptic curve group to propose a certificateless signature to solve the above problem. To check the integrity of files stored in the cloud, we design a certificateless public verification mechanism based on the signature and further extend it to support batch auditing tasks. Meanwhile, an efficient key updating method is proposed to provide visitors a friendly data success environment. The security analysis proves that the proposed scheme is secure under the discrete logarithm assumption. Extensive theoretical analyses and experimental results show the effectiveness of the proposed scheme.
  • loading
  • Y. Li, Y. Yu, G. Min, et al., “Fuzzy identity-based data integrity auditing for reliable cloud storage systems”, IEEE Transactions on Dependable and Secure Computing, Vol.16, No.1, pp.72-83, 2017.
    B. Wang, B. Li and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud”, IEEE Transactions on Cloud Computing, Vol.2, No.1, pp.43-56, 2012.
    L. Huang, J. Zhou, G. Zhang, et al., “Certificateless public verification for the outsourced data integrity in cloud storage”, Journal of Circuits, Systems and Computers, Vol.27, No.11, Article ID 1850181, 2018.
    Q. Huang, Z. Ma, Y. Yang, et al., “Secure data sharing and retrieval using attribute-based encryption in cloudbased OSNs”, Chinese Journal of Electronics, Vol.23, No.3, pp.557-563, 2014.
    G. Ateniese, R. C. Burns, R. Curtmola, et al., “Remote data checking using provable data possession”, ACM Transaction on Information and System Security, Vol.14, No.1, pp.12, 2011.
    C. Wang, S. Chow, Q. Wang, et al., “Privacy-preserving public auditing for secure cloud storage”, IEEE Transactions on Computers, Vol.62, No.2, pp.362-375, 2011.
    Y. Li, Y. Yu, B. Yang, et al., “Privacy preserving cloud data auditing with efficient key update”, Future Generation Computer Systems, Vol.78, pp.789-798, 2018.
    B. Wang, B. Li and H. Li, “Knox: privacy-preserving auditing for shared data with large groups in the cloud”, International Conference on Applied Cryptography and Network Security, Singapore, Singapore, pp.507-525, 2012.
    L. Huang, G. Zhang and A. Fu, “Privacy-preserving public auditing for non-manager group shared data”, Wireless Personal Communications, Vol.100, No.4, pp.1277-1294, 2018.
    C. Wang, Q. Wang, K. Ren, et al., “Privacy-preserving public auditing for data storage security in cloud computing”, IEEE INFOCOM, San Diego, CA, USA, pp.1-9, 2010.
    J. Xie, Y. Hu, J. Gao, et al., “Certificateless sequential aggregate signature scheme on NTRU Lattice”, Chinese Journal of Electronics, Vol.28, No.2, pp.294-300, 2019.
    J. Zhang and Q. Dong, “Efficient ID-based public auditing for the outsourced data in cloud storage”, Information Sciences, Vol.343, pp.1-14, 2016.
    H. Wang, “Identity-based distributed provable data possession in multicloud storage”, IEEE Transactions on Services Computing, Vol.8, No.2, pp.328-340, 2015.
    J. Zhang, P. Li and J. Mao, “IPad: ID-based public auditing for the outsourced data in the standard model”, Cluster Computing, Vol.19, No.1, pp.127-138, 2016.
    D. He, N. Kumar, S. Zeadally, et al., “Certificateless provable data possession scheme for cloud-based smart grid data management systems”, IEEE Transactions on Industrial Informatics, Vol.14, No.3, pp.1232-1241, 2017.
    D. He, S. Zeadally and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks”, IEEE Systems Journal, Vol.12, No.1, pp.64-73, 2015.
    Z. Ren, L. Wang, Q. Wu, et al., “Data dynamics enabled privacypreserving public batch auditing in cloud storage”, Chinese Journal of Electronics, Vol.23, No.2, pp.297-301, 2014.
    Y. Qi, X. Tang and Y. Huang, “Enabling efficient batch updating verification for multi-versioned data in cloud storage”, Chinese Journal of Electronics, Vol.28, No.2, pp.377-385, 2019.
    X. Zou, B. Ramamurthy and S. Magliveras, “Chinese remainder theorem based hierarchical access control for secure group communication”, International Conference on Information and Communications Security, Xi'an, China, pp.381-385, 2001.
    L. Huang, G. Zhang, S. Yu, et al., “Customized data sharing scheme based on blockchain and weighted attribute”, IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, United Arab Emirates, pp.206-212, 2018.
    J. Zhang, J. Cui, H. Zhong, et al., “PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks”, IEEE Transactions on Dependable and Secure Computing, 2019.
    S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography”, International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, pp.452-473, 2003.
    B. Lynn, “Pbc: The pairing-based cryptography library”, http://crypto.stanford.edu/pbc,2011.
    L. Huang, G. Zhang, S. Yu, et al., “SeShare: Secure cloud data sharing based on blockchain and public auditing”, Concurrency and Computation: Practice and Experience, Vol.2017, Article ID e4359, 2017.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (732) PDF downloads(136) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return