Abstract
Provable Data Possession (PDP) is a technique for checking whether data is correctly stored in remote servers without retrieving the entire data. For many previous PDP schemes, correctly choosing public key for clients relies on the security of Public Key Infrastructure (PKI), but PKI itself still faces many kinds of security vulnerabilities. In addition, the verification of certificates introduces heavy computation and communication cost. In this paper, we propose an Identity-Based Batch Provable Data Possession (ID-BPDP) scheme to eliminate the certificate management. Meanwhile, to the best of our knowledge, it is the first identity-based provable data possession scheme supporting batch verification for multiple owners and multiple clouds simultaneously to reduce computation cost greatly. Our scheme is provably correct and secure based on bilinear pairings and the hardness assumption of Computational Diffie-Hellman problem, and our analyses/simulations show that the scheme is able to verify the integrity of data efficiently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Kon-winski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of CCS, pp. 598–609 (2007)
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: Proceedings of ICDCS, pp. 411–420 (2008)
Sebé, F., Domingo-Ferrer, J., Martínez-Ballesté, A., Deswarte, Y., Quisquater, J.: Efficient remote data integrity checking in critical information infrastuctures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of SecureComm, pp. 1–10 (2008)
Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of CCS, pp. 213–222 (2009)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM (2010)
Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Efficient provable data possession for hybrid clouds. In: Proceedings of CCS, pp. 756–758 (2010)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)
Wang, H.: Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–559 (2013)
Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)
Lier, S., Wörsdörfer, D., Gesing, J.: Business models and product service systems for transformable, modular plants in the chemical process industry. In: Meier, H. (ed.) Product-Service Integration for Sustainable Solutions. LNPE, vol. 6, pp. 227–238. Springer, Heidelberg (2013)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
Yu, Y., Ni, J., Au, M.H., Liu, H., Wang, H., Xu, C.: Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41, 7789–7796 (2014)
Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)
Yu, Y., Au, M.H., Mu, Y., Tang, S., Ren, J., Susilo, W., Dong, L.: Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Secur. 14, 307–318 (2015)
Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)
Yu, Y., Ni, J., Au, M.H., Mu, Y., Wang, B., Li, H.: Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. Serv. Comput. 8(6), 998–999 (2015)
Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on “public integrity auditing for dynamic data sharing with multiuser modification”. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)
Ellison, C., Schneier, B.: Ten risks of PKI: what you’re not being told about public key infrastructure. Comput. Secur. J. 16(1), 1–7 (2000)
Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
The GNU multiple precision arithmetic library. https://gmplib.org
The pairing-based cryptography library (PBC). https://crypto.stanford.edu/pbc
OpenSSL: cryptography and SSL/TLS Toolkit. http://www.openssl.org
Coron, J.-S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 220–235. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Zhou, F., Peng, S., Xu, J., Xu, Z. (2016). Identity-Based Batch Provable Data Possession. In: Chen, L., Han, J. (eds) Provable Security. ProvSec 2016. Lecture Notes in Computer Science(), vol 10005. Springer, Cham. https://doi.org/10.1007/978-3-319-47422-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-47422-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47421-2
Online ISBN: 978-3-319-47422-9
eBook Packages: Computer ScienceComputer Science (R0)