Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
Abstract Under the shared big data environment, the existing shared data auditing schemes rarely consider the authorization management of group users. Thus, in this paper, we propose a novel remote shared data checking possession scheme that support group authority management. To implement group use...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2023-08-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-023-40682-9 |
_version_ | 1797453117154918400 |
---|---|
author | Yilin Yuan Zhenzhen Zhang |
author_facet | Yilin Yuan Zhenzhen Zhang |
author_sort | Yilin Yuan |
collection | DOAJ |
description | Abstract Under the shared big data environment, the existing shared data auditing schemes rarely consider the authorization management of group users. Thus, in this paper, we propose a novel remote shared data checking possession scheme that support group authority management. To implement group user rights management, we firstly introduce a trusted entity group manager. To assist the group manager in authorization management, we formalize a new algebraic structure operator named authorization invisible authenticator (AIA). Meanwhile, we provide a basic AIA scheme for general security scenarios and a standard AIA scheme suitable for high-level security scenarios respectively. The standard AIA scheme can fully meet the needs of the group manager to safely perform rights management work. It is composed of the User Information Table (UIT) and the basic AIA scheme, which has higher security and is applicable to a wider range of scenarios. By distributing AIA through the standard AIA scheme, the group manager can easily carry out authority management, including enrolling, revoking, updating. After solving the problem of authorization management, the detailed design of the scheme based on identity-based encryption (IBE) is given. Furthermore, the security analysis and performance evaluation demonstrate that the scheme is safe and feasible. |
first_indexed | 2024-03-09T15:18:16Z |
format | Article |
id | doaj.art-20a45a79110e44f68051d68c57a13d6e |
institution | Directory Open Access Journal |
issn | 2045-2322 |
language | English |
last_indexed | 2024-03-09T15:18:16Z |
publishDate | 2023-08-01 |
publisher | Nature Portfolio |
record_format | Article |
series | Scientific Reports |
spelling | doaj.art-20a45a79110e44f68051d68c57a13d6e2023-11-26T12:57:43ZengNature PortfolioScientific Reports2045-23222023-08-0113111510.1038/s41598-023-40682-9Remote data possession checking scheme with supporting efficient group user authority management for shared cloud dataYilin Yuan0Zhenzhen Zhang1College of Information Engineering, Beijing Institute of Graphic CommunicationCollege of Information Engineering, Beijing Institute of Graphic CommunicationAbstract Under the shared big data environment, the existing shared data auditing schemes rarely consider the authorization management of group users. Thus, in this paper, we propose a novel remote shared data checking possession scheme that support group authority management. To implement group user rights management, we firstly introduce a trusted entity group manager. To assist the group manager in authorization management, we formalize a new algebraic structure operator named authorization invisible authenticator (AIA). Meanwhile, we provide a basic AIA scheme for general security scenarios and a standard AIA scheme suitable for high-level security scenarios respectively. The standard AIA scheme can fully meet the needs of the group manager to safely perform rights management work. It is composed of the User Information Table (UIT) and the basic AIA scheme, which has higher security and is applicable to a wider range of scenarios. By distributing AIA through the standard AIA scheme, the group manager can easily carry out authority management, including enrolling, revoking, updating. After solving the problem of authorization management, the detailed design of the scheme based on identity-based encryption (IBE) is given. Furthermore, the security analysis and performance evaluation demonstrate that the scheme is safe and feasible.https://doi.org/10.1038/s41598-023-40682-9 |
spellingShingle | Yilin Yuan Zhenzhen Zhang Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data Scientific Reports |
title | Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data |
title_full | Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data |
title_fullStr | Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data |
title_full_unstemmed | Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data |
title_short | Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data |
title_sort | remote data possession checking scheme with supporting efficient group user authority management for shared cloud data |
url | https://doi.org/10.1038/s41598-023-40682-9 |
work_keys_str_mv | AT yilinyuan remotedatapossessioncheckingschemewithsupportingefficientgroupuserauthoritymanagementforsharedclouddata AT zhenzhenzhang remotedatapossessioncheckingschemewithsupportingefficientgroupuserauthoritymanagementforsharedclouddata |