Netinfo Security ›› 2015, Vol. 15 ›› Issue (8): 1-7.doi: 10.3969/j.issn.1671-1122.2015.08.001

    Next Articles

A Revocable Authorization Provable Data Possession Scheme in Clouds

ZHAO Yang, CHEN Yang(), XIONG Hu, REN Hua-qiang   

  1. School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 610054, China
  • Received:2015-05-18 Online:2015-08-01 Published:2015-08-21

Abstract:

There are two main provable data possession schemes: public verification and verification, but it is very difficult when users want to specify a third party to verify the data. In this regard, we propose a revocable authorization provable data possession scheme in clouds. The scheme allows users to authorize a third party audit to help them perform remote data integrity verification. This can protect users’ privacy. In addition, users can revoke the third party audit’s authorization when they need and authorize a new third party. In our scheme only the third party it has the authorization can complete the verification process and give back the result to users. Furthermore, users can choose to keep the authorized evidence secret, authorize to a third party or public to achieve private verification, authorized verification or public verification. The scheme is designed base on bilinear pairing and identity-based encryption (IDE) technology. And it achieves authorization verification or revocation by embedding authorized evidence to integrity verification. Then we analyze the security and performance of the scheme to prove the scheme is safety and efficiency at last of the paper.

Key words: provable data possession, revocable authorization, IBE, authorization checking, bilinear pairings

CLC Number: