Skip to main content
Log in

Public verifiability for shared data in cloud storage with a defense against collusion attacks

支持抗共谋攻击的云共享数据完整性验证方案

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

摘要

摘要

群用户可以利用云存储服务实现数据共享和更新。 而为了确保共享数据的完整性, 国内外学者提出了相应的验证方案。 但当撤销用户和云端存在共谋时, 就会存在撤销用户任意篡改数据内容而不被发现的问题。 本文针对群用户成员撤销带来的数据完整性验证问题, 特别是云端和撤销用户之间存在共谋的威胁, 提出一种抗共谋攻击的共享数据动态完整性验证方案。 该方案基于Merkle Hash Tree (MHT)结构和代理重签名技术, 不仅支持群用户对共享数据内容的任意更新, 而且可以有效防止撤销用户通过篡改共享数据达到欺骗验证方的目的。 通过性能和实验分析, 在安全实现群用户撤销的基础上, 本文提出的方案在完整性验证过程中产生的开销是可以接受的。

本文主要创新点如下:

  1. 1.

    对现有方案的安全性进行了详细分析, 指出每个方案存在的安全问题和相应的攻击过程;

  2. 2.

    提出了抗共谋攻击的共享数据动态完整性验证新方案, 详细介绍了方案的架构、原理和过程;

  3. 3.

    利用密码学知识对提出的方案进行了安全性理论证明;

  4. 4.

    基于详细的性能测试实验, 文章分析讨论了在实现安全目标的基础上方案在验证过程中产生的开销问题, 并得出开销可以接受和方案可行的结论。

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Kwon O, Koo D Y, Shin Y J, et al. A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci World J, 2014, 2014: 1–16

    Google Scholar 

  2. Wang B Y, Li B C, Li H. Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput, 2014, 2: 43–56

    Article  Google Scholar 

  3. Wang B Y, Li B C, Li H. Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Proceedings of 10th International Conference on Applied Cryptography and Network Security, Singapore, 2012. 507–525

    Google Scholar 

  4. Wang B Y, Li B C, Li H. Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput, 2013, 8: 92–106

    Article  Google Scholar 

  5. Yuan J W, Yu S C. Public integrity auditing for dynamic data sharing with multi-user modification. In: Proceedings of 33rd Annual IEEE International Conference on Computer Communications, Toronto, 2014. 2121–2129

    Google Scholar 

  6. Jiang T, Chen X F, Ma J F. Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput, 2015, PP: 1

    Google Scholar 

  7. Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing. J Cryptol, 2004, 17: 297–319

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhonghua Wang.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Z., Han, Z. & Liu, J. Public verifiability for shared data in cloud storage with a defense against collusion attacks. Sci. China Inf. Sci. 59, 39101 (2016). https://doi.org/10.1007/s11432-016-5519-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-5519-7

关键词

Navigation