TY - JOUR
T1 - Efficient Group Proof of Storage with Malicious-Member Distinction and Revocation
AU - Zhu, Liehuang
AU - Wang, Hongyuan
AU - Xu, Chang
AU - Sharif, Kashif
AU - Lu, Rongxing
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2019
Y1 - 2019
N2 - Proof of Storage (POS) is a system utilized by a client to verify whether the original data is intact while being possessed by an untrusted server. In a grouping application, multiple members share and verify the same file, and the group manager is responsible for determining if the data has been manipulated based on the responses from group members. However, a malicious member may repudiate a correct proof; therefore, it is important to distinguish the honest members from malicious ones. To the best of our knowledge, none of the existing group-oriented schemes have solved this challenge efficiently and up to the desired satisfaction. In this paper, based on matrix calculation, pseudo-random functions, and commitment functions, we propose a new Group Proof of Storage with Malicious-Member Distinction and Revocation scheme (DR-GPOS). Specifically, in terms of functionality, DR-GPOS can distinguish and revoke the malicious members, as well as, guarantee the integrity and deduplication of the outsourced data. From a security perspective, DR-GPOS can also resist against selective attacks and the collusion attacks from the revoked members (e.g. forging proofs by colluding with the server). The security properties of the proposed schemes have also been formally proven in a standard model. We have further implemented it in a real-world (Baidu) cloud server, to evaluate the performance with large scale data (> 10 G).
AB - Proof of Storage (POS) is a system utilized by a client to verify whether the original data is intact while being possessed by an untrusted server. In a grouping application, multiple members share and verify the same file, and the group manager is responsible for determining if the data has been manipulated based on the responses from group members. However, a malicious member may repudiate a correct proof; therefore, it is important to distinguish the honest members from malicious ones. To the best of our knowledge, none of the existing group-oriented schemes have solved this challenge efficiently and up to the desired satisfaction. In this paper, based on matrix calculation, pseudo-random functions, and commitment functions, we propose a new Group Proof of Storage with Malicious-Member Distinction and Revocation scheme (DR-GPOS). Specifically, in terms of functionality, DR-GPOS can distinguish and revoke the malicious members, as well as, guarantee the integrity and deduplication of the outsourced data. From a security perspective, DR-GPOS can also resist against selective attacks and the collusion attacks from the revoked members (e.g. forging proofs by colluding with the server). The security properties of the proposed schemes have also been formally proven in a standard model. We have further implemented it in a real-world (Baidu) cloud server, to evaluate the performance with large scale data (> 10 G).
KW - Malicious-member distinction
KW - cloud storage
KW - deduplication
KW - malicious-member revocation
KW - proof of storage
UR - http://www.scopus.com/inward/record.url?scp=85068321758&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2019.2917919
DO - 10.1109/ACCESS.2019.2917919
M3 - Article
AN - SCOPUS:85068321758
SN - 2169-3536
VL - 7
SP - 75476
EP - 75489
JO - IEEE Access
JF - IEEE Access
M1 - 8718655
ER -