A Provable Data Possession Scheme with Data Hierarchy in Cloud

In recent years, numerous provable data possession PDP schemes have been proposed for checking the availability and integrity of data stored on cloud storage server CSS which is not fully trusted. However, these schemes do not work with specific subsets of verifiers, and they do not efficiently support dynamic enrollment and revocation of verifiers. In this paper, we propose a novel provable data possession scheme under hierarchical data framework in cloud environment. Our scheme can be considered as a generalization of privately verifiable PDP schemes. Specifically, data of different values are integrated into a data hierarchy, and clients are classified and authorized different access permissions according to their amounts of payment. Furthermore, our scheme allows the data owner to efficiently enroll and revoke clients. The scheme satisfies existential unforgeability against malicious CSS based on the hardness of the computational Diffie-Hellman problem.

[1]  Huaqun Wang,et al.  Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.

[2]  Albert Y. Zomaya,et al.  Remote Data Auditing in Cloud Computing Environments , 2015, ACM Comput. Surv..

[3]  Gail-Joon Ahn,et al.  Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Gail-Joon Ahn,et al.  Cryptographic role-based security mechanisms based on role-key hierarchy , 2010, ASIACCS '10.

[5]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[6]  Gail-Joon Ahn,et al.  Zero-knowledge proofs of retrievability , 2011, Science China Information Sciences.

[7]  Roberto Tamassia,et al.  Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..

[8]  Thomas Plantard,et al.  Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy , 2015, ACISP.

[9]  Lin Tan,et al.  An efficient method for checking the integrity of data in the Cloud , 2014 .

[10]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[11]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[12]  Yongjun Ren,et al.  Attributed Based Provable Data Possession in Public Cloud Storage , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Craig A. Knoblock,et al.  A Survey of Digital Map Processing Techniques , 2014, ACM Comput. Surv..

[14]  Josep Domingo-Ferrer,et al.  Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..

[15]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[16]  Yongjun Ren,et al.  Designated-Verifier Provable Data Possession in Public Cloud Storage , 2013 .

[17]  Shucheng Yu,et al.  Proofs of retrievability with public verifiability and constant communication cost in cloud , 2013, Cloud Computing '13.

[18]  Wen-Guey Tzeng,et al.  Delegable Provable Data Possession for Remote Data in the Clouds , 2011, ICICS.

[19]  Ghassan O. Karame,et al.  Outsourced Proofs of Retrievability , 2014, CCS.