Lightweight integrity verification scheme for cloud based group data
Contents Papers|更新时间:2024-06-05
|
Lightweight integrity verification scheme for cloud based group data
Journal on CommunicationsVol. 37, Issue Z1, Pages: 140-146(2016)
作者机构:
1. 国防科技大学计算机学院,湖南 长沙 410073
2. 密码科学技术国家重点实验室,北京100878
作者简介:
基金信息:
The National Natural Science Foundation of China(61572026);The National Natural Science Foundation of China(61472439);The National Natural Science Foundation of China(61379052);The Open Foundation of State Key Laboratory of Cryptology;The Open Fund Project of Innovation Platform for Universities in Hunan Prov-ince(13K025(2014-2016))
Yun-fei LIU, Yong-jun WANG, UShao-jing F. Lightweight integrity verification scheme for cloud based group data[J]. Journal on Communications, 2016, 37(Z1): 140-146.
DOI:
Yun-fei LIU, Yong-jun WANG, UShao-jing F. Lightweight integrity verification scheme for cloud based group data[J]. Journal on Communications, 2016, 37(Z1): 140-146. DOI: 10.11959/j.issn.1000-436x.2016260.
Lightweight integrity verification scheme for cloud based group data
In order to protect the security of the data stored in the cloud by group users
a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data
and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is
the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels
which reduces the storage cost of labels and supports the dynamic operation of group data
so that the users in the group can easily modify the cloud group data.
关键词
Keywords
references
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data pos-session at untrusted stores[C]//ACM CCS . 2007 : 598 - 610 .
ATENIESE G , KAMARA S , KATZ J . Proofs of storage from homomorphic identification protocols[C]//ASIACRYPT 2009 : 319 - 333 .
BONEH D , LYNN B , SHACHAM H . Short signature from the weil pairing[C]//ASIACRYPT 2001 . 2001 : 514 - 532 .
SHACHAM H , WATERS B . Compact proofs of retrievability[C]//ASIACRYPT 2008 . 2008 : 90 - 107 .
ATENIESE G , PIETRO R D , MANCINI L V , et al . Scalable and efficient provable data possession[C]//4th ICST SecureComm . 2008 .
WANG Q , WANG C , LI J , et al . Enabling public verifiability and data dynamic for storage security in cloud computing[C]//ESORICS 2009 . 2009 : 355 - 370 .
ERWAY C , KUPCU A , PAPAMANTHOU C , et al . Dynamic provable data possession[C]//Proceedings of ACM CCS . 2009 : 213 - 222 .
ZHU Y , WANG H , HU Z , et al . Dynamic audit services for integrity verification of outsourced storage in cloud[C]//ACM SAC . 2011 : 1550 - 1557 .
ZHU Y , AHN G J , HU H , et al . Dynamic audit services for outsourced storage in clouds[C]//IEEE Transactions on Services Computing , 2013 , 6 ( 99 ): 1 .
WANG C , WANG Q , REN K , et al . Privacy-preserving public audit-ing for data storage security in cloud computing[C]//IEEE INFOCOM . 2010 : 525 - 533 .
WANG C , CHOW S S , WANG Q , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
BONEH D , GENTRY C , LYNN B , et al . Aggregate and verifiably encrypted signatures from bilinear maps[C]//EUROCRYPT 2003 . 2003 : 416 - 432 .
ZHU Y , WANG H , HU Z , et al . Poster:efficient provable data posses-sion for hybird clouds[C]//ACM CCS . 2010 .
TATE S R , VISHWANATHAN R , EVERHART L . Multi-user dy-namic proofs of data possession using trusted hardware[C]//ACM CODASPY . 2013 : 353 - 364 .
WANG B , LI B , LI H . Oruta:privacy-preserving public auditing for shared data in the cloud[C]//IEEE 5th International Conference on Cloud Computing (CLOUD'12) . Piscataway , NJ:IEEE , 2012 : 295 - 302 .
WANG B , LI B , LI H . Knox:privacy-preserving auditing for shared data with large groups in the cloud[C]//10th International Conference on Applied Cryptography and Network Security (ACNS'12) . 2012 : 507 - 525 .
WANG B , LI B , LI H . Public auditing for shared data with efficient user revocation in the cloud[C]//2013 IEEE International Conference on Computer Communication (INFOCOM'13) . Los Alamitos , 2013 : 2904 - 2912 .