Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Dynamic authenticated data structures with access control for outsourcing data stream

Today, many resource-constrained terminal devices prefer to outsource data stream to an intermediary for managing and storing. However, within this growing trend, the trusted problem of outsourcing data stream is universally concerned. It is extremely critical to prove that the data stream provided by the third party is trust. Therefore, in order to efficiently and effectively verify the trusted of the outsourcing data stream with adequate control, this study presents a kind of dynamic authenticated data structure with access control on outsourced data stream. Based on this data structure, the authors are able to establish a novel authentication scheme, which can support data stream to add and update in real time and verification with fine-grained access control. In addition, the security and efficiency of the proposed scheme are analysed in this study. Through comparing and analysing with the existing schemes, the proposed scheme has higher security and efficiency in terms of data stream addition and update.

References

    1. 1)
      • 2. Zhu, Y., Wang, H., Hu, Z., et al: ‘Efficient provable data possession for hybrid clouds’. Proc. 17th ACM Conf. Computer and Communications Security, 2010, pp. 756758.
    2. 2)
      • 6. Ling, L.: ‘Reserch on some issues of data security in cloud computing services’. PhD thesis, University of Science and Technology of China, 2012.
    3. 3)
      • 1. Hsiao, H.-C., Lin, Y.-H., Studer, A., et al: ‘A study of user-friendly Hash comparison schemes’. Proc. Ann. Computer Security Applications Conf. (ACSAC), 2009, pp. 105114.
    4. 4)
      • 12. Ateniese, G., de Medeiros, B.: ‘On the key exposure problem in chameleon hashes’. SCN 2004, 2005 (LNCS, 3352), pp. 165179.
    5. 5)
      • 9. Liu, C., Chen, J., Yang, L., et al: ‘Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates’, IEEE Trans. Parallel Distrib. Syst., Early Access Online, 2013, doi: 10.1109/TPDS.2013.191.
    6. 6)
      • 4. Merkle, R.C.: ‘Protocols for public key cryptosystems’. Proc. Symp. on Security and Privacy, 1980, pp. 122134.
    7. 7)
      • 15. Lewko, A., Okamoto, T., Sahai, A., et al: ‘Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption’. EUROCRYPT 2011, 2010 (LNCS, 6110), pp. 6291.
    8. 8)
      • 11. Schroeder, D., Schroeder, H.: ‘Verifiable data streaming’. Proc. 2012 ACM Conf. on Computer and Communications Security, 2012, pp. 953964, doi: 10.1145/2382196.2382297.
    9. 9)
      • 14. Bethencourt, J., Sahai, A., Waters, B.: ‘Ciphertext-policy attribute-based encryption’. IEEE Symp. on Security and Privacy, 2007, pp. 321334.
    10. 10)
      • 10. Tang, Y., Wang, T., Hu, X., et al: ‘Outsourcing multi-version key-value stores with verifiable data freshness’. Presented at the 2014 IEEE 30th Int. Conf. on Data Engineering (ICDE), 2014, pp. 12141217, doi: 10.1109/ICDE.2014.6816744.
    11. 11)
      • 16. Bellare, M., Garay, J.A., Rabin, T.: ‘Fast batch verification for modular exponentiation and digital signatures’. Advances in Cryptology – EUROCRYPT'98, Espoo, Finland, 31 May–4 June 1998 (LNCS, 1403), pp. 236250.
    12. 12)
      • 13. Chandrasekhar, S., Chakrabarti, S., Singhal, M.: ‘A trapdoor Hash-based mechanism for stream authentication’, IEEE Trans. Dependable Secur. Comput., 2012, 9, (5), pp. 699713.
    13. 13)
      • 8. Kandappu, T., Sivaraman, V., Boreli, R.: ‘A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices’. 2012 Ninth Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012, pp. 488496.
    14. 14)
      • 5. Merkle, R.C.: ‘A certified digital signature’. Proc. CRYPTO'89, 1990 (LNCS, 435), pp. 218238.
    15. 15)
      • 3. Tamassia, R.: ‘Authenticated data structures’. Proc. 11th Annual European Symp., 2003 (LNCS, 2832), pp. 25.
    16. 16)
      • 7. Marek, K., Yakov, N.: ‘A note on traversing skew Merkle trees’. ECCC, 2004.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0243
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0243
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address