Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems

The smart grid is considered to be the next-generation electric power network. In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system. However, with data no longer being stored locally, how to ensure the integrity of data stored in the cloud in the smart grid has become an urgent problem awaiting solution. Provable data possession has been proposed to solve this problem. With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. Lattice cryptography can resist quantum attacks. In this article, a lattice-based provable data possession scheme is proposed for cloud-based smart grid data management systems. The scheme is proved unforgeable under the small integer solution hard assumption in the standard model. Compared with other two efficient lattice-based provable data possession schemes in the standard model, our scheme also shows efficiency.

[1]  Wenbin Yao,et al.  Attribute-Based Signcryption From Lattices in the Standard Model , 2019, IEEE Access.

[2]  Wang Yao,et al.  Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing , 2018, Multimedia tools and applications.

[3]  Sherali Zeadally,et al.  Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems , 2018, IEEE Transactions on Industrial Informatics.

[4]  Yao Zhang,et al.  A survey on the development status and challenges of smart grids in main driver countries , 2017 .

[5]  Baoyuan Kang,et al.  Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks , 2017, Mob. Inf. Syst..

[6]  Ronald Cramer,et al.  Recovering Short Generators of Principal Ideals in Cyclotomic Rings , 2016, EUROCRYPT.

[7]  Chris Peikert,et al.  A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..

[8]  Jianhong Zhang,et al.  IPad: ID-based public auditing for the outsourced data in the standard model , 2016, Cluster Computing.

[9]  Liang Chen,et al.  A post-quantum provable data possession protocol in cloud , 2013, Secur. Commun. Networks.

[10]  Wei Xu,et al.  Public verifiable proof of storage protocol from lattice assumption , 2012, 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment.

[11]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[13]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[14]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[15]  Syed Imran Jami,et al.  Current Trends in Cloud Computing for Data Science Experiments , 2021, Int. J. Cloud Appl. Comput..

[16]  Richard O. Sinnott,et al.  Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology , 2019, IEEE Access.

[17]  Dongxi Liu,et al.  An Identity-Based Signcryption on Lattice without Trapdoor , 2019, J. Univers. Comput. Sci..

[18]  Yang Yang,et al.  Secure Cloud Storage Based on RLWE Problem , 2019, IEEE Access.

[19]  Ahmad M. Manasrah,et al.  An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment , 2017, Cluster Computing.

[20]  Shingo Yamaguchi,et al.  Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey , 2016 .

[21]  Michael Schneider,et al.  Estimating the Security of Lattice-based Cryptosystems , 2010, IACR Cryptol. ePrint Arch..