谷歌浏览器插件
订阅小程序
在清言上使用

Privacy-preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited.

Applied mathematics and computation(2020)

引用 49|浏览14
暂无评分
摘要
Certificateless provable data possession (CL-PDP) protocol is an important tool to check the integrity of data outsourced to cloud service provider (CSP) since it is not necessary to consider the certificate management and key escrow problems. In 2017, He et al. proposed an efficient CL-PDP protocol (HKWWC-protocol, for short) with an additional good property: Privacy protection from the verifier [AppL Math. Comput., vol. 314, pp. 31-43]. However, recently, Liao et al. illustrates that the HKWWC-protocol is completely insecure under their suggested attack (LLON-attack) since CSP can return a forged proof that is able to pass the verification of the verifier, which shows that the HKWWC-protocol will become completely useless. In this paper, we revisit the original HKWWC-protocol and try to rescue it. After our modification, the twisted new protocol can be immune to the LLON-attack. More importantly, we find that the original He et al.'s security model cannot depict the practical scene at all because they viewed CSP and KGC (key generation center) as one entity in their system. Hence, we redefine a new security model and prove the twisted HKWWC-protocol is secure under our new security model. Performance analysis shows that our proposed protocol is still efficient and practical. (C) 2020 Elsevier Inc. All rights reserved.
更多
查看译文
关键词
Data storage,Certificateless PDP,Privacy-preserving,Data integrity
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要