You are not logged in.

SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors

Zhang, Yuan, Xu, Chunxiang, Yu, Shui, Li, Hongwei and Zhang, Xiaojun 2015, SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors, IEEE transactions on computational social systems, vol. 2, no. 4, pp. 159-170, doi: 10.1109/TCSS.2016.2517205.

Attached Files
Name Description MIMEType Size Downloads

Title SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors
Author(s) Zhang, Yuan
Xu, Chunxiang
Yu, ShuiORCID iD for Yu, Shui orcid.org/0000-0003-4485-6743
Li, Hongwei
Zhang, Xiaojun
Journal name IEEE transactions on computational social systems
Volume number 2
Issue number 4
Start page 159
End page 170
Total pages 12
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2015-12
ISSN 2329-924X
Keyword(s) certificateless
cloud storage
cyber-physical-social systems (CPSSs)
public integrity verification
resistance against malicious auditors
Summary Cyber-physical-social system (CPSS) allows individuals to share personal information collected from not only cyberspace but also physical space. This has resulted in generating numerous data at a user's local storage. However, it is very expensive for users to store large data sets, and it also causes problems in data management. Therefore, it is of critical importance to outsource the data to cloud servers, which provides users an easy, cost-effective, and flexible way to manage data, whereas users lose control on their data once outsourcing their data to cloud servers, which poses challenges on integrity of outsourced data. Many schemes have been proposed to allow a third-party auditor to verify data integrity using the public keys of users. Most of these schemes bear a strong assumption: the auditors are honest and reliable, and thereby are vulnerability in the case that auditors are malicious. Moreover, in most of these schemes, an auditor needs to manage users certificates to choose the correct public keys for verification. In this paper, we propose a secure certificateless public integrity verification scheme (SCLPV). The SCLPV is the first work that simultaneously supports certificateless public verification and resistance against malicious auditors to verify the integrity of outsourced data in CPSS. A formal security proof proves the correctness and security of our scheme. In addition, an elaborate performance analysis demonstrates that the SCLPV is efficient and practical. Compared with the only existing certificateless public verification scheme (CLPV), the SCLPV provides stronger security guarantees in terms of remedying the security vulnerability of the CLPV and resistance against malicious auditors. In comparison with the best of integrity verification scheme achieving resistance against malicious auditors, the communication cost between the auditor and the cloud server of the SCLPV is independent of the size of the processed data, meanwhile, the auditor in the SCLPV does not need to manage certificates.
Language eng
DOI 10.1109/TCSS.2016.2517205
Field of Research 080109 Pattern Recognition and Data Mining
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30083631

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 8 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 117 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Thu, 26 May 2016, 09:12:31 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.