Skip to main content

Provably Secure Identity Based Provable Data Possession

  • Conference paper
  • First Online:
Provable Security (ProvSec 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9451))

Included in the following conference series:

Abstract

Provable Data Possession (PDP), which enables cloud users to verify the integrity of their outsourced data without retrieving the entire file from cloud servers, is highly essential in secure cloud storage. A majority of the existing PDP schemes rely on the expensive Public Key Infrastructure (PKI). In this paper, we eliminate the complex certificate management of PDP by presenting a generic construction of identity-based PDP (ID-PDP) protocol, derived from identity-based signatures (IBS) and traditional PDP protocols. We formalize the security model of ID-PDP and prove that the soundness of the generic construction depends on the security of the underlying PDP protocols and the IBS. Then, a concrete ID-PDP protocol is described as an instance of the generic construction to a state-of-the-art PDP protocol due to Shacham and Waters. The implementation shows that our ID-PDP protocol is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.businessinsider.com.au/amazon-lost-data-2011-4.

References

  1. Mell, P., Grance, T.: Draft NIST working definition of cloud computing, Referenced on June 3rd (2009). http://csrc.nist.gov/groups/SNS/cloud-computing/index.html

  2. Wang, X., Cao, J., Xiang, Y.: Dynamic cloud service selection using an adaptive learning mechanism in multi-cloud computing. J. Syst. Softw. 100, 195–210 (2015)

    Article  Google Scholar 

  3. Yi, X., Bertino, E., Vaidya, J., Xing, C.: Private searching on streaming data based on keyword frequency. IEEE Trans. Dependable Sec. Comput. 11(2), 155–167 (2014)

    Article  Google Scholar 

  4. Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)

    Article  Google Scholar 

  5. Chen, X., Li, J., Huang, X., Li, J., Xiang, Y., Wong, D.: Secure outsourced attribute-based signatures. IEEE Trans. Parallel Distrib. Syst. 25(12), 3285–3294 (2014)

    Article  Google Scholar 

  6. Cloud Security Alliance. Top Threats to Cloud Computing (2010). http://www.cloudsecurityalliance.org

  7. Cloud Vulnerabilities Working Group of the cloud security alliance. Cloud Computing Vulnerability Incidents: A Statistical Overview (2011). https://cloudsecurityalliance.org/research/vulnerabilities/#_downloads

  8. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Processing of ACM Conference on Computer and Communications Security (CCS2007), pp. 598–609 (2007)

    Google Scholar 

  9. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, 1–34 (2011)

    Article  Google Scholar 

  10. Juels, A., Burton, J., Kaliski, S.: Pors: proofs of retrievability for large files. In: ACM CCS 2007, pp. 584–597 (2007)

    Google Scholar 

  11. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptology 26(3), 442–483 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  13. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Wang, C., Ren, K., Lou, W., Li, J.: Toward public auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)

    Article  Google Scholar 

  15. Zhu, Y., Hu, H., Ahn, G.J., Stephen, Y.S.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5), 1083–1095 (2012)

    Article  Google Scholar 

  16. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Processing of INFOCOM 2010, pp. 525–533 (2010)

    Google Scholar 

  17. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)

    Article  Google Scholar 

  18. Lier, S., Wörsdörfer, D., Gesing, J.: Business models and product service systems for transformable, modular plants in the chemical process industry. In: Meier, H. (ed.) Product-Service Integration for Sustainable Solutions. LNPE, vol. 6, pp. 227–238. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  19. Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceeding of IEEE Conference on Computer Communications (IEEE INFOCOM 2013), Turin, Italy, pp. 2904–2912, 14–19 April 2013

    Google Scholar 

  20. Wang, B., Li, B., Li, H.: Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015). doi:10.1109/TSC.2013.2295611

    Article  Google Scholar 

  21. Yu, Y., Zhang, Y., Ni, J., Au, M.H., et al.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)

    Article  Google Scholar 

  22. Yu, Y., Au, M.H., Mu, Y., Tang, S., Ren, J., Susilo, W., Dong, L.: Enhanced privacy of a remote data integrity checking protocol for secure cloud storage. Int. J. Inf. Secur. 14(4), 307–318 (2014). doi:10.1007/s10207-014-0263-8

    Article  Google Scholar 

  23. Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B.Y., Li, H.: Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Serv. Comput. (2014). doi:10.1109/TSC.2014.2355201

  24. Yu, Y., Ni, J., Au, M.H., Xu, C.X., et al.: Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41(17), 7789–7796 (2014)

    Article  Google Scholar 

  25. Casserly, M.: 7 best cloud storage services-2014’s best online storage sites revealed, 14 March 2014. http://www.pcadvisor.co.uk/features/internet/3506734/best-cloud-storage-services-review/

  26. Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2243 (2011)

    Article  Google Scholar 

  27. Wang, H., Zhang, Y.: On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 25(1), 264–267 (2014)

    Article  Google Scholar 

  28. Wang, H.: Identity-based distributed provable data possession in multi-cloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015). doi:10.1109/TSC.2014.1

    Article  Google Scholar 

  29. Cha, J.C., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) Public Key Cryptography – PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  30. Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H. (eds.) Selected Areas in Cryptography. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  31. Galindo, D., Herranz, J., Kiltz, E.: On the generic construction of identity-based signatures with additional properties. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 178–193. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  32. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268–286. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  33. Guillevic, A.: Comparing the pairing efficiency over composite-order and prime-order elliptic curves?, Cryptology ePrint Archive, Technical report. 2013/218 (2013). http://eprint.iacr.org/

Download references

Acknowledgements

This work is supported by the NSFC of China under Grant Number 61300213, 61272436.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yu, Y., Zhang, Y., Mu, Y., Susilo, W., Liu, H. (2015). Provably Secure Identity Based Provable Data Possession. In: Au, MH., Miyaji, A. (eds) Provable Security. ProvSec 2015. Lecture Notes in Computer Science(), vol 9451. Springer, Cham. https://doi.org/10.1007/978-3-319-26059-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26059-4_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26058-7

  • Online ISBN: 978-3-319-26059-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics