Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited

Storing multi-copy of data file on multi-cloud may be useful in some practical contexts. How to ensure the integrity of a user’s multi-copy becomes very important in this case. In recent work, Li et al. proposed an efficient “identity-based” auditing protocol (LYZ-protocol, for short) to achieve this goal. The “identity-based” property guarantees that the resulting primitive does not rely on PKI to manage certificates. However, in this letter, we note that the performances of this protocol can be further improved. More precisely, by introducing a new hash function modeled as a random oracle, the communication costs of original LYZ-protocol can be greatly reduced. In addition, the building block of a traditional signature scheme used in this protocol results in the entire protocol not being completely identity-based, and thus it may still bear the burden of managing certificates. Therefore, by replacing this signature with an identity-based scheme, we can obtain a completely identity-based protocol. Finally, the performance analysis shows that the modified LYZ-protocol outperforms the original one.

[1]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Genqing Bian,et al.  Comment on “A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding” , 2020, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jinyong Chang,et al.  General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding , 2019, Future Gener. Comput. Syst..

[4]  Fei Wang,et al.  RKA Security for Identity-Based Signature Scheme , 2020, IEEE Access.

[5]  Jiguo Li,et al.  Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage , 2019, IEEE Transactions on Cloud Computing.

[6]  Fan Wu,et al.  An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics , 2018, SpaCCS.

[7]  Josep Domingo-Ferrer,et al.  Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..

[8]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[9]  Weizhe Zhang,et al.  Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing , 2020, IEEE Transactions on Cloud Computing.

[10]  Genqing Bian,et al.  Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited , 2020, Appl. Math. Comput..

[11]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[12]  Baoyuan Kang,et al.  ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification , 2018, Secur. Commun. Networks.

[13]  M. Anwar Hasan,et al.  Provable Multicopy Dynamic Data Possession in Cloud Computing Systems , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[15]  Flavio D. Garcia,et al.  A Schnorr-Like Lightweight Identity-Based Signature Scheme , 2009, AFRICACRYPT.

[16]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..