Abstract
Cloud storage service can provide a lot convenience for users to collect, store and share data within a group. However, there are some secure issues, one of which is that the cloud server may cheat users for a good reputation when the data is lost. A classical solution to deal with it is provable data possession (PDP) protocols. Most of PDP protocols are relied on either the public key infrastructure or identity-based cryptography. However, certificate management and key escrow issues place a significant burden on this. Furthermore, revoking the group’s illegal users is a critical issue for PDP schemes. To address these problems, we put forward a certificateless PDP scheme for shared data with user revocation. Our proposed scheme not only achieves efficient user revocation but also withstands collusion attack. We also give a formal proof of security of our proposed scheme without random oracle model. Experimental results and analysis show that our scheme is quite effective in data auditing, verification, and user revocation.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs10586-023-04078-8/MediaObjects/10586_2023_4078_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs10586-023-04078-8/MediaObjects/10586_2023_4078_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs10586-023-04078-8/MediaObjects/10586_2023_4078_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs10586-023-04078-8/MediaObjects/10586_2023_4078_Fig4_HTML.png)
Similar content being viewed by others
Data availability
None.
References
Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. Association for Computing Machinery (2007)
Wang, Q., Wang, C., Ren, K., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2010)
Shen, W., Qin, J., Yu, J., et al.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2018)
Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: International Conference on Applied Cryptography and Network Security, pp. 507–525. Springer (2012)
Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2013)
He, K., Chen, J., Yuan, Q., et al.: Dynamic group-oriented provable data possession in the cloud. IEEE Trans. Dependable Secure Comput. 18(3), 1394–1408 (2019)
Tian, H., Nan, F., Jiang, H., et al.: Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107–125 (2019)
Luo, Y., Xu, M., Huang, K., et al.: Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput. Secur. 73, 492–506 (2018)
Zhang, Y., Yu, J., Hao, R., et al.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secure Comput. 17(3), 608–619 (2018)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452–473. Springer (2003)
Li, J., Yan, H., Zhang, Y.: Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans. Serv. Comput. 14(1), 71–81 (2018)
Zhou, L., Fu, A., Yang, G., et al.: Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans. Dependable Secure Comput. (2020). https://doi.org/10.1109/TDSC.2020.3013927
Gudeme, J.R., Pasupuleti, S.K., Kandukuri, R.: Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage. Comput. Secur. 103, 102176 (2021)
Xu, Z., He, D., Vijayakumar, P., et al.: Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical WSNs. IEEE J. Biomed. Health Inform. (2021). https://doi.org/10.1109/JBHI.2021.3128775
Ateniese, G., Di Pietro, R., Mancini, L.V., et al.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp. 1–10. Association for Computing Machinery (2008)
Erway, C.C., Küpçü, A., Papamanthou, C., et al.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–29 (2015)
Zhu, Y., Ahn, G.J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2011)
Tian, H., Chen, Y., Chang, C., et al.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2015)
Zhu, Y., Hu, H., Ahn, G.J., et al.: Collaborative integrity verification in hybrid clouds. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 191–200. IEEE (2011)
Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2011)
Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2016)
Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 15(1), 577–585 (2020)
Ji, Y., Shao, B., Chang, J., et al.: Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. Clust. Comput. 25(1), 337–349 (2022)
Yan, H., Liu, Y., Zhang, Z., et al.: Efficient privacy-preserving certificateless public auditing of data in cloud storage. Secur. Commun. Netw. (2021). https://doi.org/10.1155/2021/6639634
Li, Y., Yu, Y., Yang, B., et al.: Privacy preserving cloud data auditing with efficient key update. Future Gener. Comput. Syst. 78, 789–798 (2018)
Tian, J., **g, X.: Cloud data integrity verification scheme for associated tags. Comput. Secur. 95, 101847 (2020)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43–56 (2014)
Liu, X., Zhang, Y., Wang, B., et al.: Mona: secure multi-owner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2012)
Wang, B., Li, B., Li, H., et al.: Certificateless public auditing for data integrity in the cloud. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 136–144. IEEE (2013)
He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12(1), 64–73 (2015)
Qi, Y., Luo, Y., Huang, Y., et al.: Blockchain-based privacy-preserving group data auditing with secure user revocation. Comput. Syst. Sci. Eng. 45(1), 183–199 (2023)
Funding
This research is sponsored by the National Natural Science Foundation of China under Grants U21A20466, 61702153 and 61972124.
Author information
Authors and Affiliations
Contributions
GY wrote the main manuscript text, LH modified the manuscript text, and he is the corresponding author. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies involving human or animal subjects.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yang, G., Han, L., Bi, J. et al. A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. Cluster Comput 27, 2165–2179 (2024). https://doi.org/10.1007/s10586-023-04078-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-023-04078-8