Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Title | Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems |
Publication Type | Journal Article |
Year of Publication | 2017 |
Authors | Wu, T. Y., Tseng, Y. M., Huang, S. S., Lai, Y. C. |
Journal | IEEE Access |
Volume | 5 |
Pagination | 19333–19341 |
Keywords | associated tags, Cascading style sheets, cloud computing, cloud storage, cloud storage server, cloud storage systems, composability, Computational modeling, concrete DV-NRPDP scheme, data integrity, data mining, Data models, designated verifier, digital signatures, DV-PDP schemes, Human Behavior, human factor, Metrics, non-repudiation, nonrepudiable PDP scheme, nonrepudiable provable data possession scheme, nonrepudiation issue, outsourced data, private auditability, private verifier, provable data possession, pubcrawl, Repudiation, resilience, Resiliency, security, Servers, storage management |
Abstract | In cloud storage systems, users can upload their data along with associated tags (authentication information) to cloud storage servers. To ensure the availability and integrity of the outsourced data, provable data possession (PDP) schemes convince verifiers (users or third parties) that the outsourced data stored in the cloud storage server is correct and unchanged. Recently, several PDP schemes with designated verifier (DV-PDP) were proposed to provide the flexibility of arbitrary designated verifier. A designated verifier (private verifier) is trustable and designated by a user to check the integrity of the outsourced data. However, these DV-PDP schemes are either inefficient or insecure under some circumstances. In this paper, we propose the first non-repudiable PDP scheme with designated verifier (DV-NRPDP) to address the non-repudiation issue and resolve possible disputations between users and cloud storage servers. We define the system model, framework and adversary model of DV-NRPDP schemes. Afterward, a concrete DV-NRPDP scheme is presented. Based on the computing discrete logarithm assumption, we formally prove that the proposed DV-NRPDP scheme is secure against several forgery attacks in the random oracle model. Comparisons with the previously proposed schemes are given to demonstrate the advantages of our scheme. |
URL | https://ieeexplore.ieee.org/document/8039158/ |
DOI | 10.1109/ACCESS.2017.2753243 |
Citation Key | wu_non-repudiable_2017 |
- provable data possession
- Metrics
- non-repudiation
- nonrepudiable PDP scheme
- nonrepudiable provable data possession scheme
- nonrepudiation issue
- outsourced data
- private auditability
- private verifier
- human factor
- pubcrawl
- Repudiation
- resilience
- Resiliency
- security
- Servers
- storage management
- associated tags
- Human behavior
- DV-PDP schemes
- digital signatures
- designated verifier
- Data models
- Data mining
- data integrity
- concrete DV-NRPDP scheme
- Computational modeling
- composability
- cloud storage systems
- cloud storage server
- cloud storage
- Cloud Computing
- Cascading style sheets