A Provable data possession scheme with data hierarchy in cloud

Changlu Lin*, Fucai Luo, Huaxiong Wang, Yan Zhu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

In recent years, numerous provable data possession (PDP) schemes have been proposed for checking the availability and integrity of data stored on cloud storage server (CSS) which is not fully trusted. However, these schemes do not work with specific subsets of verifiers, and they do not efficiently support dynamic enrollment and revocation of verifiers. In this paper, we propose a novel provable data possession scheme under hierarchical data framework in cloud environment. Our scheme can be considered as a generalization of privately verifiable PDP schemes. Specifically, data of different values are integrated into a data hierarchy, and clients are classified and authorized different access permissions according to their amounts of payment. Furthermore, our scheme allows the data owner to efficiently enroll and revoke clients. The scheme satisfies existential unforgeability against malicious CSS based on the hardness of the computational Diffie-Hellman problem.

Original languageEnglish
Title of host publicationInformation security and cryptology
Subtitle of host publication11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015 ; proceedings
EditorsDongdai Lin, XiaoFeng Wang, Moti Yung
Place of PublicationCham
PublisherSpringer, Springer Nature
Pages301-321
Number of pages21
ISBN (Electronic)9783319388984
ISBN (Print)9783319388977
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event11th International Conference on Information Security and Cryptology, Inscrypt 2015 - Beijing, China
Duration: 1 Nov 20153 Nov 2015

Publication series

NameLecture Notes in Computer Science
Volume9589
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th International Conference on Information Security and Cryptology, Inscrypt 2015
CountryChina
CityBeijing
Period1/11/153/11/15

Keywords

  • Cloud storage server
  • Computational Diffie-Hellman assumption
  • Data hierarchy
  • Provable data possession

Fingerprint Dive into the research topics of 'A Provable data possession scheme with data hierarchy in cloud'. Together they form a unique fingerprint.

Cite this