Log in

A collusion-resistant certificateless provable data possession scheme for shared data with user revocation

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues, one of which is that the cloud server may cheat users for a good reputation when the data is lost. A classical solution to deal with it is provable data possession (PDP) protocols. Most of PDP protocols are relied on either the public key infrastructure or identity-based cryptography. However, certificate management and key escrow issues place a significant burden on this. Furthermore, revoking the group’s illegal users is a critical issue for PDP schemes. To address these problems, we put forward a certificateless PDP scheme for shared data with user revocation. Our proposed scheme not only achieves efficient user revocation but also withstands collusion attack. We also give a formal proof of security of our proposed scheme without random oracle model. Experimental results and analysis show that our scheme is quite effective in data auditing, verification, and user revocation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

None.

References

  1. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. Association for Computing Machinery (2007)

  2. Wang, Q., Wang, C., Ren, K., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2010)

    Article  Google Scholar 

  3. Shen, W., Qin, J., Yu, J., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2018)

    Article  Google Scholar 

  4. Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: International Conference on Applied Cryptography and Network Security, pp. 507–525. Springer (2012)

  5. Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2013)

    Article  Google Scholar 

  6. He, K., Chen, J., Yuan, Q., et al.: Dynamic group-oriented provable data possession in the cloud. IEEE Trans. Dependable Secure Comput. 18(3), 1394–1408 (2019)

    Google Scholar 

  7. Tian, H., Nan, F., Jiang, H., et al.: Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107–125 (2019)

    Article  Google Scholar 

  8. Luo, Y., Xu, M., Huang, K., et al.: Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput. Secur. 73, 492–506 (2018)

    Article  Google Scholar 

  9. Zhang, Y., Yu, J., Hao, R., et al.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secure Comput. 17(3), 608–619 (2018)

    Google Scholar 

  10. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452–473. Springer (2003)

  11. Li, J., Yan, H., Zhang, Y.: Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans. Serv. Comput. 14(1), 71–81 (2018)

    Google Scholar 

  12. Zhou, L., Fu, A., Yang, G., et al.: Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans. Dependable Secure Comput. (2020). https://doi.org/10.1109/TDSC.2020.3013927

    Article  Google Scholar 

  13. Gudeme, J.R., Pasupuleti, S.K., Kandukuri, R.: Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage. Comput. Secur. 103, 102176 (2021)

    Article  Google Scholar 

  14. Xu, Z., He, D., Vijayakumar, P., et al.: Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical WSNs. IEEE J. Biomed. Health Inform. (2021). https://doi.org/10.1109/JBHI.2021.3128775

    Article  Google Scholar 

  15. Ateniese, G., Di Pietro, R., Mancini, L.V., et al.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 1–10. Association for Computing Machinery (2008)

  16. Erway, C.C., Küpçü, A., Papamanthou, C., et al.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–29 (2015)

    Article  Google Scholar 

  17. Zhu, Y., Ahn, G.J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2011)

    Google Scholar 

  18. Tian, H., Chen, Y., Chang, C., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2015)

    Article  Google Scholar 

  19. Zhu, Y., Hu, H., Ahn, G.J., et al.: Collaborative integrity verification in hybrid clouds. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 191–200. IEEE (2011)

  20. Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2011)

    Article  MathSciNet  Google Scholar 

  21. Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2016)

    Article  Google Scholar 

  22. Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 15(1), 577–585 (2020)

    Article  Google Scholar 

  23. Ji, Y., Shao, B., Chang, J., et al.: Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. Clust. Comput. 25(1), 337–349 (2022)

    Article  Google Scholar 

  24. Yan, H., Liu, Y., Zhang, Z., et al.: Efficient privacy-preserving certificateless public auditing of data in cloud storage. Secur. Commun. Netw. (2021). https://doi.org/10.1155/2021/6639634

    Article  Google Scholar 

  25. Li, Y., Yu, Y., Yang, B., et al.: Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78, 789–798 (2018)

    Article  Google Scholar 

  26. Tian, J., **g, X.: Cloud data integrity verification scheme for associated tags. Comput. Secur. 95, 101847 (2020)

    Article  Google Scholar 

  27. Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43–56 (2014)

    Article  Google Scholar 

  28. Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2012)

    Article  Google Scholar 

  29. Wang, B., Li, B., Li, H., et al.: Certificateless public auditing for data integrity in the cloud. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 136–144. IEEE (2013)

  30. He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12(1), 64–73 (2015)

    Article  Google Scholar 

  31. Qi, Y., Luo, Y., Huang, Y., et al.: Blockchain-based privacy-preserving group data auditing with secure user revocation. Comput. Syst. Sci. Eng. 45(1), 183–199 (2023)

    Article  Google Scholar 

Download references

Funding

This research is sponsored by the National Natural Science Foundation of China under Grants U21A20466, 61702153 and 61972124.

Author information

Authors and Affiliations

Authors

Contributions

GY wrote the main manuscript text, LH modified the manuscript text, and he is the corresponding author. All authors reviewed the manuscript.

Corresponding author

Correspondence to Lidong Han.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies involving human or animal subjects.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, G., Han, L., Bi, J. et al. A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. Cluster Comput 27, 2165–2179 (2024). https://doi.org/10.1007/s10586-023-04078-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-04078-8

Keywords

Navigation