Delegable Provable Data Possession for Remote Data in the Clouds

نویسندگان

  • Shiuan-Tzuo Shen
  • Wen-Guey Tzeng
چکیده

Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, they don’t want a stranger to check data integrity on their data. Therefore, public verification is undesired in this situation. The user can share his private key to his friends for private verification. However, his friends may reveal his private key to others. In this paper, we proposed the delegable provable data possession (delegable PDP) model to solve this problem. Delegable PDP allows a user to control who can check data integrity of his data, and guarantee that delegated verifiers cannot re-delegate this verification capability to others. Delegable PDP enjoys advantage of authorized verification and convenience of public verification. We define a delegable PDP model and provide a construction for it. User U generates verifiable tags of his data and the delegation key dkU→V for delegated verifier V. U uploads his data, tags, and dkU→V to storage servers. When integrity check, storage servers can use dkU→V to transform U ’s tags into the form that V can verify with his private key skV . Our model allows U to revoke V’s verification capability by removing dkU→V from storage servers directly. We prove our protocol secure in the random oracle model. Our protocol achieves proof unforgeability, proof indistinguishability, and delegation key unforgeability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Preserving Client Privacy and Designate Verifier Auditing Scheme for Cloud Storage

Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some proof of storage schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the schemes are not ...

متن کامل

Designated-Verifier Provable Data Possession in Public Cloud Storage

Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data confidentiality, integrity, and availability. In this paper, we propose designated verifier provable data possession (DV-PDP). In public clouds, DV-PDP is a matter of crucial importance when the client ...

متن کامل

Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage

Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP) makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes...

متن کامل

A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage

Cloud storage service, which enables users to store the data in the remote cloud and to access to it over the Internet regardless of location and time, is an important development trend in information technologies. This cloud storage provides on-demand high quality storage and computing resources, but it also introduces new security challenges. Thus, an auditing service is desired to convince u...

متن کامل

Provable Data Possession in Single Cloud Server: A Survey, Classification and Comparative Study

Storage-as-a-Service (SaaS) offered by cloud service providers is a paid facility that enables organizations to outsource their data to be stored on remote servers. Thus, SaaS reduces the maintenance cost and mitigates the burden of large local data storage at the organization’s end. However, the fact that data owners no longer physically possess their sensitive data raises new challenges to th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011