Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data

Abstract Under the shared big data environment, the existing shared data auditing schemes rarely consider the authorization management of group users. Thus, in this paper, we propose a novel remote shared data checking possession scheme that support group authority management. To implement group use...

Full description

Bibliographic Details
Main Authors: Yilin Yuan, Zhenzhen Zhang
Format: Article
Language:English
Published: Nature Portfolio 2023-08-01
Series:Scientific Reports
Online Access:https://doi.org/10.1038/s41598-023-40682-9
_version_ 1797453117154918400
author Yilin Yuan
Zhenzhen Zhang
author_facet Yilin Yuan
Zhenzhen Zhang
author_sort Yilin Yuan
collection DOAJ
description Abstract Under the shared big data environment, the existing shared data auditing schemes rarely consider the authorization management of group users. Thus, in this paper, we propose a novel remote shared data checking possession scheme that support group authority management. To implement group user rights management, we firstly introduce a trusted entity group manager. To assist the group manager in authorization management, we formalize a new algebraic structure operator named authorization invisible authenticator (AIA). Meanwhile, we provide a basic AIA scheme for general security scenarios and a standard AIA scheme suitable for high-level security scenarios respectively. The standard AIA scheme can fully meet the needs of the group manager to safely perform rights management work. It is composed of the User Information Table (UIT) and the basic AIA scheme, which has higher security and is applicable to a wider range of scenarios. By distributing AIA through the standard AIA scheme, the group manager can easily carry out authority management, including enrolling, revoking, updating. After solving the problem of authorization management, the detailed design of the scheme based on identity-based encryption (IBE) is given. Furthermore, the security analysis and performance evaluation demonstrate that the scheme is safe and feasible.
first_indexed 2024-03-09T15:18:16Z
format Article
id doaj.art-20a45a79110e44f68051d68c57a13d6e
institution Directory Open Access Journal
issn 2045-2322
language English
last_indexed 2024-03-09T15:18:16Z
publishDate 2023-08-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj.art-20a45a79110e44f68051d68c57a13d6e2023-11-26T12:57:43ZengNature PortfolioScientific Reports2045-23222023-08-0113111510.1038/s41598-023-40682-9Remote data possession checking scheme with supporting efficient group user authority management for shared cloud dataYilin Yuan0Zhenzhen Zhang1College of Information Engineering, Beijing Institute of Graphic CommunicationCollege of Information Engineering, Beijing Institute of Graphic CommunicationAbstract Under the shared big data environment, the existing shared data auditing schemes rarely consider the authorization management of group users. Thus, in this paper, we propose a novel remote shared data checking possession scheme that support group authority management. To implement group user rights management, we firstly introduce a trusted entity group manager. To assist the group manager in authorization management, we formalize a new algebraic structure operator named authorization invisible authenticator (AIA). Meanwhile, we provide a basic AIA scheme for general security scenarios and a standard AIA scheme suitable for high-level security scenarios respectively. The standard AIA scheme can fully meet the needs of the group manager to safely perform rights management work. It is composed of the User Information Table (UIT) and the basic AIA scheme, which has higher security and is applicable to a wider range of scenarios. By distributing AIA through the standard AIA scheme, the group manager can easily carry out authority management, including enrolling, revoking, updating. After solving the problem of authorization management, the detailed design of the scheme based on identity-based encryption (IBE) is given. Furthermore, the security analysis and performance evaluation demonstrate that the scheme is safe and feasible.https://doi.org/10.1038/s41598-023-40682-9
spellingShingle Yilin Yuan
Zhenzhen Zhang
Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
Scientific Reports
title Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
title_full Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
title_fullStr Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
title_full_unstemmed Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
title_short Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
title_sort remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
url https://doi.org/10.1038/s41598-023-40682-9
work_keys_str_mv AT yilinyuan remotedatapossessioncheckingschemewithsupportingefficientgroupuserauthoritymanagementforsharedclouddata
AT zhenzhenzhang remotedatapossessioncheckingschemewithsupportingefficientgroupuserauthoritymanagementforsharedclouddata