Provable data possession scheme with authentication
Papers|更新时间:2024-06-05
|
Provable data possession scheme with authentication
Journal on CommunicationsVol. 37, Issue 10, Pages: 117-127(2016)
作者机构:
1. 西安电子科技大学综合业务网理论与关键技术国家重点实验室,陕西 西安 710071
2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
3. 北京电子科技学院信息安全研究所,北京 100070
作者简介:
基金信息:
The National Natural Science Foundation of China(61170251);The National High Technology Research and Development Program (863 Program)(2015AA016007);The National Natural Science Foundation of China –Guangdong Union Foundation(U1401251)
Hao-xing LI, Feng-hua LI, Cheng-gen SONG, et al. Provable data possession scheme with authentication[J]. Journal on Communications, 2016, 37(10): 117-127.
DOI:
Hao-xing LI, Feng-hua LI, Cheng-gen SONG, et al. Provable data possession scheme with authentication[J]. Journal on Communications, 2016, 37(10): 117-127. DOI: 10.11959/j.issn.1000-436x.2016203.
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios
a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing
the proposed scheme could accomplish several issues with three interactions
including the possession proof of cloud data
the mutual authentication between user and cloud computing server
the session key agreement and confirmation.Compared to the simple combination of authentication key agreement and provable data possession schemes
the proposed scheme has less computation and interactions
and better provable securities.In the random oracle model
the security proof of the proposed scheme is given under the computational Diffie-Hellman assumption.
关键词
Keywords
references
BUYYA R , YEO C S , VENUGOPAL S , et al . Cloud computing and emerging IT platforms:vision,hype,and reality for delivering computing as the 5th utility [J ] . Future Generation Computer Systems , 2009 , 25 ( 6 ): 599 - 616 .
WU J , SHEN Q , WANG T , et al . Recent advances in cloud security [J ] . Journal of Computers , 2014 , 5 ( 10 ): 2156 - 2163 .
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . ACM , 2007 : 598 - 609 .
BOWERS K D , JUELS A , OPREA A . Proofs of retrievability:theory and implementation [C ] // ACM Cloud Computing Security Workshop,CCSW 2009 . Chicago,Il,USA , 2009 : 43 - 54 .
CHOUDHURY A J , KUMAR P , SAIN M , et al . A strong user authentication framework for cloud computing [C ] // IEEE Asia-Pacific Services Computing Conference . Jeju,Korea , 2011 : 110 - 115 .
LIU C , CHEN J , YANG L T , et al . Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates [J ] . IEEE Transactions on Parallel & Distributed Systems , 2014 , 25 ( 9 ): 2234 - 2244 .
GRITTI C , SUSILO W , PLANTARD T . Efficient dynamic provable data possession with public verifiability and data privacy [M ] // Information Security and Privacy . Springer International Publishing , 2015 : 395 - 412 .
WANG B , LI B , LI H . Panda:public auditing for shared data with efficient user revocation in the cloud [J ] . IEEE Transactions on Services Computing , 2015 ( 1 ): 92 - 106 .
SHEN S T , ZENG W G . Delegable provable data possession for remote data in the clouds [M ] // Information and Communications Security . Springer Berlin Heidelberg , 2011 : 93 - 111 .
WANG H . Proxy provable data possession in public clouds [J ] . IEEE Transactions on Services Computing , 2013 , 6 ( 4 ): 551 - 559 .
RUAN H M , LEI C L . Fine-grained audit privilege control for integrity audit on cloud storage [C ] // 2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS) . IEEE , 2014 : 156 - 163 .
XU J , CHEN W , JI S , et al . A novel preserving client privacy and designate verifier auditing scheme for cloud storage [J ] . International Journal of Security and Its Applications , 2015 , 9 ( 1 ): 295 - 304 .
NIMMY K , SETHUMADHAVAN M . Novel mutual authentication protocol for cloud computing using secret sharing and steganography [C ] // Applications of Digital Information and Web Technologies . IEEE , 2014 : 101 - 106 .
HAO Z , ZHONG S , YU N , et al . A time-bound ticket-based mutual authentication scheme for cloud computing [J ] . International Journal of Computers Communications & Control , 2011 ,( VI2 ): 227 - 235 .
HUANG J J , JUANG W S , FAN C I , et al . Robust and privacy protection authentication in cloud computing [J ] . International Journal of Innovative Computing,Information and Control , 2013 , 9 ( 11 ): 4247 - 4261 .
NAGARAJU S , PARTHIBAN L . SecAuthn:provably secure multifactor authentication for the cloud computing systems [J ] . Indian Journal of Science and Technology , 2016 , 9 ( 9 ).
HAHN C , KWON H , KIM D , et al . Enhanced authentication for outsourced educational contents through provable block possession [J ] . Multimedia Tools & Applications , 2015 , 23 : 1 - 20 .
CREMERS C , FELTZ M . Beyond eCK:perfect forward secrecy under actor compromise and ephemeral-key reveal [J ] . Designs,Codes and Cryptography , 2015 , 74 ( 1 ): 183 - 218 .
KRAWCZYK H , . HMQV:a high-performance secure Diffie-Hellman protocol [C ] // Advances in Cryptology–CRYPTO 2005 . Springer Berlin Heidelberg , 2005 : 546 - 566 .
SCOTT M , . MIRACL-multiprecision integer and rational arithmetic C/C++ library(1988-2007) [EB/OL ] . http://www3.cs.stonybrook.edu/~algorith/implement/shamus/distrib/ miracl3.zip http://www3.cs.stonybrook.edu/~algorith/implement/shamus/distrib/ miracl3.zip .