Dynamic authenticated data structures with access control for outsourcing data stream

Dynamic authenticated data structures with access control for outsourcing data stream

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Today, many resource-constrained terminal devices prefer to outsource data stream to an intermediary for managing and storing. However, within this growing trend, the trusted problem of outsourcing data stream is universally concerned. It is extremely critical to prove that the data stream provided by the third party is trust. Therefore, in order to efficiently and effectively verify the trusted of the outsourcing data stream with adequate control, this study presents a kind of dynamic authenticated data structure with access control on outsourced data stream. Based on this data structure, the authors are able to establish a novel authentication scheme, which can support data stream to add and update in real time and verification with fine-grained access control. In addition, the security and efficiency of the proposed scheme are analysed in this study. Through comparing and analysing with the existing schemes, the proposed scheme has higher security and efficiency in terms of data stream addition and update.


    1. 1)
      • 1. Hsiao, H.-C., Lin, Y.-H., Studer, A., et al: ‘A study of user-friendly Hash comparison schemes’. Proc. Ann. Computer Security Applications Conf. (ACSAC), 2009, pp. 105114.
    2. 2)
      • 2. Zhu, Y., Wang, H., Hu, Z., et al: ‘Efficient provable data possession for hybrid clouds’. Proc. 17th ACM Conf. Computer and Communications Security, 2010, pp. 756758.
    3. 3)
      • 3. Tamassia, R.: ‘Authenticated data structures’. Proc. 11th Annual European Symp., 2003 (LNCS, 2832), pp. 25.
    4. 4)
      • 4. Merkle, R.C.: ‘Protocols for public key cryptosystems’. Proc. Symp. on Security and Privacy, 1980, pp. 122134.
    5. 5)
      • 5. Merkle, R.C.: ‘A certified digital signature’. Proc. CRYPTO'89, 1990 (LNCS, 435), pp. 218238.
    6. 6)
      • 6. Ling, L.: ‘Reserch on some issues of data security in cloud computing services’. PhD thesis, University of Science and Technology of China, 2012.
    7. 7)
      • 7. Marek, K., Yakov, N.: ‘A note on traversing skew Merkle trees’. ECCC, 2004.
    8. 8)
      • 8. Kandappu, T., Sivaraman, V., Boreli, R.: ‘A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices’. 2012 Ninth Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012, pp. 488496.
    9. 9)
      • 9. Liu, C., Chen, J., Yang, L., et al: ‘Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates’, IEEE Trans. Parallel Distrib. Syst., Early Access Online, 2013, doi: 10.1109/TPDS.2013.191.
    10. 10)
      • 10. Tang, Y., Wang, T., Hu, X., et al: ‘Outsourcing multi-version key-value stores with verifiable data freshness’. Presented at the 2014 IEEE 30th Int. Conf. on Data Engineering (ICDE), 2014, pp. 12141217, doi: 10.1109/ICDE.2014.6816744.
    11. 11)
      • 11. Schroeder, D., Schroeder, H.: ‘Verifiable data streaming’. Proc. 2012 ACM Conf. on Computer and Communications Security, 2012, pp. 953964, doi: 10.1145/2382196.2382297.
    12. 12)
      • 12. Ateniese, G., de Medeiros, B.: ‘On the key exposure problem in chameleon hashes’. SCN 2004, 2005 (LNCS, 3352), pp. 165179.
    13. 13)
      • 13. Chandrasekhar, S., Chakrabarti, S., Singhal, M.: ‘A trapdoor Hash-based mechanism for stream authentication’, IEEE Trans. Dependable Secur. Comput., 2012, 9, (5), pp. 699713.
    14. 14)
      • 14. Bethencourt, J., Sahai, A., Waters, B.: ‘Ciphertext-policy attribute-based encryption’. IEEE Symp. on Security and Privacy, 2007, pp. 321334.
    15. 15)
      • 15. Lewko, A., Okamoto, T., Sahai, A., et al: ‘Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption’. EUROCRYPT 2011, 2010 (LNCS, 6110), pp. 6291.
    16. 16)
      • 16. Bellare, M., Garay, J.A., Rabin, T.: ‘Fast batch verification for modular exponentiation and digital signatures’. Advances in Cryptology – EUROCRYPT'98, Espoo, Finland, 31 May–4 June 1998 (LNCS, 1403), pp. 236250.

Related content

This is a required field
Please enter a valid email address