1. Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management.
- Author
-
Tian, Ying, Tan, Haowen, Shen, Jian, Pandi, Vijayakumar, Gupta, Brij B., and Arya, Varsha
- Subjects
- *
TRUST , *INFORMATION sharing , *CLOUD storage , *TROJAN horses (Computer viruses) , *AUDITING , *DOWNLOADING - Abstract
The development of cloud storage provides convenient group data sharing services to us. In reality, not only can users upload data to the cloud, but more often they are inclined to download data from the cloud. Unfortunately, data stored on the cloud is not always trustworthy, and downloading Trojan or virus data can bring bad experiences to users. In certain cloud computing scenarios, with the aim of preventing data loss, both the original data and the corresponding data copies are stored. Consequently, the huge amounts of stored data copies result in large storage overhead to the cloud. In order to tackle all of the above problems, an efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management is presented in this paper. In our scheme, the group manager detects shared data and generates short signatures for the data that can pass detection successfully before it is stored on the cloud. Further, the group manager calculates the trust value for users and enhances the management of user behavior according to it. Through adopting data merging, the total amount of data copies and the overhead of users and cloud are reduced in our scheme. In terms of security, our scheme can resist forgery attacks launched by three different adversaries. At last, we prove that our scheme is secure and practical through security and performance analysis, respectively. • This paper proposes a shared data integrity auditing scheme supporting distributed trust management, which can effectively prevent malicious users from sharing malicious data such as Trojans or virus data. • In our scheme, each user is bound to a trust value, which indicates the trustworthiness of the user. • The user's trust value is generated by the manager, and when it does not satisfy the conditions for sharing data, the user will not be allowed to share data on the cloud. • In the group, the manager checks the data shared by the user and generates signatures for the legal data. • The cloud will refuse to store any data that cannot be verified by the manager's public key. • This scheme also realizes efficient integrity auditing, batch verification, and multi-copy storage. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF