scholarly journals Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage

2020 ◽  
Vol 8 (1) ◽  
pp. 138-151 ◽  
Author(s):  
Binanda Sengupta ◽  
Sushmita Ruj
2018 ◽  
Vol 11 (4) ◽  
pp. 685-698 ◽  
Author(s):  
Zhengwei Ren ◽  
Lina Wang ◽  
Qian Wang ◽  
Mingdi Xu

2021 ◽  
Author(s):  
Abdel Ali Harchaoui ◽  
Ali Younes ◽  
Abdelaaziz El Hibaoui ◽  
Ahmed Bendahmane

2017 ◽  
Vol 28 (06) ◽  
pp. 705-723
Author(s):  
Gang Yu ◽  
Xiaoxiao Ma ◽  
Zhenfu Cao ◽  
Guang Zeng ◽  
Wenbao Han

Ciphertext-policy attribute-based encryption, denoted by CP-ABE, extends identity based encryption by taking a set of attributes as users’ public key which enables scalable access control over outsourced data in cloud storage services. However, a decryption key corresponding to an attribute set may be owned by multiple users. Then, malicious users are subjectively willing to share their decryption keys for profits. In addition, the authority who issues decryption keys in CP-ABE system is able to generate arbitrary decryption key for any (including unauthorized) user. Key abuses of both malicious users and the authority have been regarded as one of the major obstacles to deploy CP-ABE system in real-world commercial applications. In this paper, we try to solve these two kinds of key abuses in CP-ABE system, and propose two accountable CP-ABE schemes supporting any LSSS realizable access structures. Two proposed accountable CP-ABE schemes allow any third party (with the help of authorities if necessary) to publicly verify the identity of an exposed decryption key, allow an auditor to publicly audit whether a malicious user or authorities should be responsible for an exposed decryption key, and the key abuser can’t deny it. At last, we prove the two schemes can achieve publicly verifiable traceability and accountability.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Lingwei Song ◽  
Dawei Zhao ◽  
Xuebing Chen ◽  
Chenlei Cao ◽  
Xinxin Niu

How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.


2012 ◽  
Vol 3 (3) ◽  
pp. 60-61
Author(s):  
V.Sajeev V.Sajeev ◽  
◽  
R.Gowthamani R.Gowthamani

Sign in / Sign up

Export Citation Format

Share Document