Abstract
For user's extremely important data, storing multiple copies on cloud(s) may be a good option because even if the integrity of one or more copies is broken, it can still recover data from other intact ones, which increases the availability and durability of the outsourced data. Some provable data possession (PDP) protocols guaranteeing the integrity of multi-copies had been proposed in the past years. But almost all of them considered storing multi-copies to single cloud, and the necessary management of certificates as well as the dependence on PKI greatly decrease their efficiencies. Therefore, in recent work, Li et al. proposed an identity-based PDP protocol, which not only avoids the tedious certificates and PKI, but also supports muiti-copies stored on multi-clouds. However, it is well-known that identity-based protocols suffer from the key-escrow attack. In this paper, we consider the certificateless multi-copy-multi-cloud protocol. Specifically, we first present its security model and then construct a concrete protocol, whose security can be proven under the classical CDH assumption. Finally, the performance analysis demonstrates that our protocol yields better efficiency and hence is practical.
Highlights
Outsourcing data to a remote cloud service provider (CSP) instead of private computers allows individuals or organizations to save their space and concentrate on innovations or other aspects, which relieves the burden of constant server updates as well as other computing issues
Li et al proposed an efficient MCMC-provable data possession (PDP) protocol, which satisfies all those facts [12]. Their protocol is identity-based (IB), which avoids the tedious certificates management and the dependence on public key infrastructure (PKI) because traditional PDP schemes with public verifiability often encounter the problem that how to recognize the relationship between someone’s true identity and his/her public key. In their IB-MCMC-PDP protocol, an additional entity: key-generation center (KGC) is proposed, who is responsible for issuing keys to different users
We propose a concrete CL-MCMC-PDP protocol and, in the random oracle model, prove its security
Summary
Outsourcing data to a remote cloud service provider (CSP) instead of private computers allows individuals or organizations to save their space and concentrate on innovations or other aspects, which relieves the burden of constant server updates as well as other computing issues. Li et al proposed an efficient MCMC-PDP protocol, which satisfies all those facts [12] As they said, their protocol is identity-based (IB), which avoids the tedious certificates management and the dependence on public key infrastructure (PKI) because traditional PDP schemes with public verifiability often encounter the problem that how to recognize the relationship between someone’s true identity and his/her public key. Their protocol is identity-based (IB), which avoids the tedious certificates management and the dependence on public key infrastructure (PKI) because traditional PDP schemes with public verifiability often encounter the problem that how to recognize the relationship between someone’s true identity and his/her public key In their IB-MCMC-PDP protocol, an additional entity: key-generation center (KGC) is proposed, who is responsible for issuing keys to different users (or DOs).
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have