Skip to main content
placeholder image

Identity-based secure distributed data storage schemes

Journal Article


Download full-text (Open Access)

Abstract


  • Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG); (2) For one query, a receiver can only access one file, instead of all files of the owner; (3) Our schemes are secure against the collusion attacks. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen ciphertext attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permissions is made by the owner for an exact file and collusion attacks can be protected in the standard model.

Authors


  •   Han, Jinguang (external author)
  •   Susilo, Willy
  •   Mu, Yi (external author)

Publication Date


  • 2014

Citation


  • Han, J., Susilo, W. & Mu, Y. (2014). Identity-based secure distributed data storage schemes. IEEE Transactions on Computers, 63 (4), 941-953.

Scopus Eid


  • 2-s2.0-84897148119

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3225&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2216

Has Global Citation Frequency


Number Of Pages


  • 12

Start Page


  • 941

End Page


  • 953

Volume


  • 63

Issue


  • 4

Place Of Publication


  • United States

Abstract


  • Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for the receiver without the necessity of knowing the content of the original files. In practice, the original files will be removed by the owner for the sake of space efficiency. Hence, the issues on confidentiality and integrity of the outsourced data must be addressed carefully. In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG); (2) For one query, a receiver can only access one file, instead of all files of the owner; (3) Our schemes are secure against the collusion attacks. Although the first scheme is only secure against the chosen plaintext attacks (CPA), the second scheme is secure against the chosen ciphertext attacks (CCA). To the best of our knowledge, it is the first IBSDDS schemes where an access permissions is made by the owner for an exact file and collusion attacks can be protected in the standard model.

Authors


  •   Han, Jinguang (external author)
  •   Susilo, Willy
  •   Mu, Yi (external author)

Publication Date


  • 2014

Citation


  • Han, J., Susilo, W. & Mu, Y. (2014). Identity-based secure distributed data storage schemes. IEEE Transactions on Computers, 63 (4), 941-953.

Scopus Eid


  • 2-s2.0-84897148119

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=3225&context=eispapers

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/2216

Has Global Citation Frequency


Number Of Pages


  • 12

Start Page


  • 941

End Page


  • 953

Volume


  • 63

Issue


  • 4

Place Of Publication


  • United States