Abstract
Provable Data Possession (PDP), which enables cloud users to verify the integrity of their outsourced data without retrieving the entire file from cloud servers, is highly essential in secure cloud storage. A majority of the existing PDP schemes rely on the expensive Public Key Infrastructure (PKI). In this paper, we eliminate the complex certificate management of PDP by presenting a generic construction of identity-based PDP (ID-PDP) protocol, derived from identity-based signatures (IBS) and traditional PDP protocols. We formalize the security model of ID-PDP and prove that the soundness of the generic construction depends on the security of the underlying PDP protocols and the IBS. Then, a concrete ID-PDP protocol is described as an instance of the generic construction to a state-of-the-art PDP protocol due to Shacham and Waters. The implementation shows that our ID-PDP protocol is efficient and practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., Grance, T.: Draft NIST working definition of cloud computing, Referenced on June 3rd (2009). http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
Wang, X., Cao, J., Xiang, Y.: Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing. J. Syst. Softw. 100, 195–210 (2015)
Yi, X., Bertino, E., Vaidya, J., Xing, C.: Private searching on streaming data based on keyword frequency. IEEE Trans. Dependable Sec. Comput. 11(2), 155–167 (2014)
Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)
Chen, X., Li, J., Huang, X., Li, J., Xiang, Y., Wong, D.: Secure outsourced attribute-based signatures. IEEE Trans. Parallel Distrib. Syst. 25(12), 3285–3294 (2014)
Cloud Security Alliance. Top Threats to Cloud Computing (2010). http://www.cloudsecurityalliance.org
Cloud Vulnerabilities Working Group of the cloud security alliance. Cloud Computing Vulnerability Incidents: A Statistical Overview (2011). https://cloudsecurityalliance.org/research/vulnerabilities/#_downloads
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Processing of ACM Conference on Computer and Communications Security (CCS2007), pp. 598–609 (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, 1–34 (2011)
Juels, A., Burton, J., Kaliski, S.: Pors: proofs of retrievability for large files. In: ACM CCS 2007, pp. 584–597 (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptology 26(3), 442–483 (2013)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Wang, C., Ren, K., Lou, W., Li, J.: Toward public auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)
Zhu, Y., Hu, H., Ahn, G.J., Stephen, Y.S.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5), 1083–1095 (2012)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Processing of INFOCOM 2010, pp. 525–533 (2010)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
Lier, S., Wörsdörfer, D., Gesing, J.: Business models and product service systems for transformable, modular plants in the chemical process industry. In: Meier, H. (ed.) Product-Service Integration for Sustainable Solutions. LNPE, vol. 6, pp. 227–238. Springer, Heidelberg (2013)
Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceeding of IEEE Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, pp. 2904–2912, 14–19 April 2013
Wang, B., Li, B., Li, H.: Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015). doi:10.1109/TSC.2013.2295611
Yu, Y., Zhang, Y., Ni, J., Au, M.H., et al.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)
Yu, Y., Au, M.H., Mu, Y., Tang, S., Ren, J., Susilo, W., Dong, L.: Enhanced privacy of a remote data integrity checking protocol for secure cloud storage. Int. J. Inf. Secur. 14(4), 307–318 (2014). doi:10.1007/s10207-014-0263-8
Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B.Y., Li, H.: Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Serv. Comput. (2014). doi:10.1109/TSC.2014.2355201
Yu, Y., Ni, J., Au, M.H., Xu, C.X., et al.: Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41(17), 7789–7796 (2014)
Casserly, M.: 7 best cloud storage services-2014’s best online storage sites revealed, 14 March 2014. http://www.pcadvisor.co.uk/features/internet/3506734/best-cloud-storage-services-review/
Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2243 (2011)
Wang, H., Zhang, Y.: On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 25(1), 264–267 (2014)
Wang, H.: Identity-based distributed provable data possession in multi-cloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015). doi:10.1109/TSC.2014.1
Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) Public Key Cryptography – PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003)
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) Selected Areas in Cryptography. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)
Galindo, D., Herranz, J., Kiltz, E.: On the generic construction of identity-based signatures with additional properties. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 178–193. Springer, Heidelberg (2006)
Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)
Guillevic, A.: Comparing the pairing efficiency over composite-order and prime-order elliptic curves?, Cryptology ePrint Archive, Technical report. 2013/218 (2013). http://eprint.iacr.org/
Acknowledgements
This work is supported by the NSFC of China under Grant Number 61300213, 61272436.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yu, Y., Zhang, Y., Mu, Y., Susilo, W., Liu, H. (2015). Provably Secure Identity Based Provable Data Possession. In: Au, MH., Miyaji, A. (eds) Provable Security. ProvSec 2015. Lecture Notes in Computer Science(), vol 9451. Springer, Cham. https://doi.org/10.1007/978-3-319-26059-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-26059-4_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26058-7
Online ISBN: 978-3-319-26059-4
eBook Packages: Computer ScienceComputer Science (R0)