A Collusion Attack on Identity-Based Public Auditing Scheme via Blockchain

Author(s):  
Xing Zou ◽  
Xiaoting Deng ◽  
Tsu-Yang Wu ◽  
Chien-Ming Chen
2021 ◽  
Author(s):  
Yilin Yuan ◽  
Jianbiao Zhang ◽  
Wanshan Xu ◽  
Xiao Wang ◽  
Yanhui Liu

Abstract Under the shared big data environment, most of the existing data auditing schemes rarely consider the authorization management of group users. Meanwhile, how to deal with the shared data integrity is a problem that needs to be pondered. Thus, in this paper, we propose a novel remote data checking possession scheme which achieves group authority management while completing the public auditing. To perform authority management work, we introduce a trusted entity – group manager. We formalize a new algebraic structure operator named authorization invisible authenticator (AIA). Meanwhile, we provide two versions of AIA scheme: basic AIA scheme and standard AIA scheme. The standard AIA scheme is constructed based on the basic AIA scheme and user information table (UIT), with advanced security and wider applicable scenarios. By virtue of standard AIA scheme, the group manager can perfectly and easily carry out authority management, including enrolling, revoking, updating. On the basis of the above, we further design a public auditing scheme for non-revoked users’ shared data. The scheme is based on identity-based encryption (IBE), which greatly reduce the necessary certificate management cost. Furthermore, the detailed security analysis and performance evaluation demonstrate that the scheme is safe and feasible.


2019 ◽  
Vol 56 ◽  
pp. 18-28 ◽  
Author(s):  
Xiaojun Zhang ◽  
Jie Zhao ◽  
Liming Mu ◽  
Yao Tang ◽  
Chunxiang Xu

2019 ◽  
Vol 472 ◽  
pp. 223-234 ◽  
Author(s):  
Xiaojun Zhang ◽  
Huaxiong Wang ◽  
Chunxiang Xu

2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Jianhong Zhang ◽  
Zhibin Sun ◽  
Jian Mao

Cloud storage has attracted more and more concern since it permits cloud users to save and employ the corresponding outsourced files at arbitrary time, with arbitrary facility and from arbitrary place. To make sure data integrality, numerous public auditing constructions have been presented. However, existing constructions mainly have built on the PKI. In these constructions, to achieve data integrality, the auditor first must authenticate the legality of PKC, which leads to a great burden for the auditor. To eliminate the verification of time-consuming certificate, in this work, we present an efficient identity-based public auditing proposal. Our construction is an identity-based data auditing system in the true sense in that the algorithm to calculate authentication signature is an identity-based signature algorithm. By extensive security evaluation and experimental testing, the consequences demonstrate that our proposal is safe and effective; it can efficiently hold back forgery attack and replay attack. Finally, compared with the two identity-based public auditing proposals, our proposal outperforms the two proposals under the condition of overall considering computational cost, communication overhead, and security strength.


2017 ◽  
Vol 375 ◽  
pp. 48-53 ◽  
Author(s):  
Debiao He ◽  
Huaqun Wang ◽  
Jianhong Zhang ◽  
Lina Wang

Sign in / Sign up

Export Citation Format

Share Document