A Revocable Authorization Provable Data Possession Scheme in Clouds

Yang ZHAO,Yang CHEN,Hu XIONG,Hua-qiang REN
DOI: https://doi.org/10.3969/j.issn.1671-1122.2015.08.001
2015-01-01
Abstract:There are two main provable data possession schemes: public verification and veriifcation, but it is very dififcult when users want to specify a third party to verify the data. In this regard, we propose a revocable authorization provable data possession scheme in clouds. The scheme allows users to authorize a third party audit to help them perform remote data integrity veriifcation. This can protect users’ privacy. In addition, users can revoke the third party audit’s authorization when they need and authorize a new third party. In our scheme only the third party it has the authorization can complete the veriifcation process and give back the result to users. Furthermore, users can choose to keep the authorized evidence secret, authorize to a third party or public to achieve private veriifcation, authorized verification or public verification. The scheme is designed base on bilinear pairing and identity-based encryption (IDE) technology. And it achieves authorization veriifcation or revocation by embedding authorized evidence to integrity veriifcation. Then we analyze the security and performance of the scheme to prove the scheme is safety and efifciency at last of the paper.
What problem does this paper attempt to address?