http://iet.metastore.ingenta.com
1887

Dynamic authenticated data structures with access control for outsourcing data stream

Dynamic authenticated data structures with access control for outsourcing data stream

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Today, many resource-constrained terminal devices prefer to outsource data stream to an intermediary for managing and storing. However, within this growing trend, the trusted problem of outsourcing data stream is universally concerned. It is extremely critical to prove that the data stream provided by the third party is trust. Therefore, in order to efficiently and effectively verify the trusted of the outsourcing data stream with adequate control, this study presents a kind of dynamic authenticated data structure with access control on outsourced data stream. Based on this data structure, the authors are able to establish a novel authentication scheme, which can support data stream to add and update in real time and verification with fine-grained access control. In addition, the security and efficiency of the proposed scheme are analysed in this study. Through comparing and analysing with the existing schemes, the proposed scheme has higher security and efficiency in terms of data stream addition and update.

References

    1. 1)
      • H.-C. Hsiao , Y.-H. Lin , A. Studer .
        1. Hsiao, H.-C., Lin, Y.-H., Studer, A., et al: ‘A study of user-friendly Hash comparison schemes’. Proc. Ann. Computer Security Applications Conf. (ACSAC), 2009, pp. 105114.
        . Proc. Ann. Computer Security Applications Conf. (ACSAC) , 105 - 114
    2. 2)
      • Y. Zhu , H. Wang , Z. Hu .
        2. Zhu, Y., Wang, H., Hu, Z., et al: ‘Efficient provable data possession for hybrid clouds’. Proc. 17th ACM Conf. Computer and Communications Security, 2010, pp. 756758.
        . Proc. 17th ACM Conf. Computer and Communications Security , 756 - 758
    3. 3)
      • R. Tamassia .
        3. Tamassia, R.: ‘Authenticated data structures’. Proc. 11th Annual European Symp., 2003 (LNCS, 2832), pp. 25.
        . Proc. 11th Annual European Symp. , 2 - 5
    4. 4)
      • R.C. Merkle .
        4. Merkle, R.C.: ‘Protocols for public key cryptosystems’. Proc. Symp. on Security and Privacy, 1980, pp. 122134.
        . Proc. Symp. on Security and Privacy , 122 - 134
    5. 5)
      • R.C. Merkle .
        5. Merkle, R.C.: ‘A certified digital signature’. Proc. CRYPTO'89, 1990 (LNCS, 435), pp. 218238.
        . Proc. CRYPTO'89 , 218 - 238
    6. 6)
      • L. Ling .
        6. Ling, L.: ‘Reserch on some issues of data security in cloud computing services’. PhD thesis, University of Science and Technology of China, 2012.
        . PhD thesis
    7. 7)
      • K. Marek , N. Yakov .
        7. Marek, K., Yakov, N.: ‘A note on traversing skew Merkle trees’. ECCC, 2004.
        . ECCC
    8. 8)
      • T. Kandappu , V. Sivaraman , R. Boreli .
        8. Kandappu, T., Sivaraman, V., Boreli, R.: ‘A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices’. 2012 Ninth Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012, pp. 488496.
        . 2012 Ninth Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) , 488 - 496
    9. 9)
      • C. Liu , J. Chen , L. Yang .
        9. Liu, C., Chen, J., Yang, L., et al: ‘Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates’, IEEE Trans. Parallel Distrib. Syst., Early Access Online, 2013, doi: 10.1109/TPDS.2013.191.
        . IEEE Trans. Parallel Distrib. Syst.
    10. 10)
      • Y. Tang , T. Wang , X. Hu .
        10. Tang, Y., Wang, T., Hu, X., et al: ‘Outsourcing multi-version key-value stores with verifiable data freshness’. Presented at the 2014 IEEE 30th Int. Conf. on Data Engineering (ICDE), 2014, pp. 12141217, doi: 10.1109/ICDE.2014.6816744.
        . Presented at the 2014 IEEE 30th Int. Conf. on Data Engineering (ICDE) , 1214 - 1217
    11. 11)
      • D. Schroeder , H. Schroeder .
        11. Schroeder, D., Schroeder, H.: ‘Verifiable data streaming’. Proc. 2012 ACM Conf. on Computer and Communications Security, 2012, pp. 953964, doi: 10.1145/2382196.2382297.
        . Proc. 2012 ACM Conf. on Computer and Communications Security , 953 - 964
    12. 12)
      • G. Ateniese , B. de Medeiros .
        12. Ateniese, G., de Medeiros, B.: ‘On the key exposure problem in chameleon hashes’. SCN 2004, 2005 (LNCS, 3352), pp. 165179.
        . SCN 2004 , 165 - 179
    13. 13)
      • S. Chandrasekhar , S. Chakrabarti , M. Singhal .
        13. Chandrasekhar, S., Chakrabarti, S., Singhal, M.: ‘A trapdoor Hash-based mechanism for stream authentication’, IEEE Trans. Dependable Secur. Comput., 2012, 9, (5), pp. 699713.
        . IEEE Trans. Dependable Secur. Comput. , 5 , 699 - 713
    14. 14)
      • J. Bethencourt , A. Sahai , B. Waters .
        14. Bethencourt, J., Sahai, A., Waters, B.: ‘Ciphertext-policy attribute-based encryption’. IEEE Symp. on Security and Privacy, 2007, pp. 321334.
        . IEEE Symp. on Security and Privacy , 321 - 334
    15. 15)
      • A. Lewko , T. Okamoto , A. Sahai .
        15. Lewko, A., Okamoto, T., Sahai, A., et al: ‘Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption’. EUROCRYPT 2011, 2010 (LNCS, 6110), pp. 6291.
        . EUROCRYPT 2011 , 62 - 91
    16. 16)
      • M. Bellare , J.A. Garay , T. Rabin .
        16. Bellare, M., Garay, J.A., Rabin, T.: ‘Fast batch verification for modular exponentiation and digital signatures’. Advances in Cryptology – EUROCRYPT'98, Espoo, Finland, 31 May–4 June 1998 (LNCS, 1403), pp. 236250.
        . Advances in Cryptology – EUROCRYPT'98 , 236 - 250
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2015.0243
Loading

Related content

content/journals/10.1049/iet-ifs.2015.0243
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address