Skip to main content

Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices

  • Conference paper
  • First Online:
Data Security and Privacy Protection (DSPP 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15216))

Included in the following conference series:

  • 96 Accesses

Abstract

With rapid advancements in handheld mobile devices (HMDs), striking a balance between storage and data security is crucial. Cloud storage has attracted great attention of users for its convenience and availability. However, data integrity becomes challenging once data is uploaded to the cloud, as physical control is lost. In this paper, we propose an efficient identity-based dynamic cloud storage data integrity auditing protocol for HMDs. Our protocol simplifies certificate management and avoids the use of Map to Point (MtP) operation during private key extraction, resulting in a 50% improvement in private key verification efficiency compared to other protocols. We optimize tag generation computation, enhancing efficiency for computation-constrained users. Furthermore, our protocol supports incremental updates for dynamic data operations. We provide detailed system and security models, demonstrating the protocol’s security in ensuring data integrity and auditing soundness. Performance comparisons reveal the computation cost advantages of our protocol, making it ideal for application in cloud-based HMDs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  2. Barreto, P.S.L.M., Libert, B., McCullagh, N., Quisquater, J.-J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 515–532. Springer, Heidelberg (2005). https://doi.org/10.1007/11593447_28

    Chapter  Google Scholar 

  3. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17, 297–319 (2004)

    Article  MathSciNet  Google Scholar 

  4. Elaine: Mobile Device Security: Startling Statistics on Data Loss and Data Breaches \(|\) The ChannelPro Network (2023). https://www.channelpronetwork.com/article/mobile-device-security-startling-statistics-data-loss-and-data-breaches

  5. Gao, Y., Chen, L., Han, J., Wu, G., Liu, S.: Similarity-based deduplication and secure auditing in IoT decentralized storage. J. Syst. Architect. 142, 102961 (2023)

    Article  Google Scholar 

  6. GSMA: The Mobile Economy 2023 (2023). https://www.gsma.com/mobileeconomy/wp-content/uploads/2023/03/270223-The-Mobile-Economy-2023.pdf

  7. Guo, Z., Zhang, K., Wei, L., Chen, S., Wang, L.: RDIMM: revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage. J. Syst. Architect. 141, 102913 (2023)

    Article  Google Scholar 

  8. Juels, A., Kaliski Jr, B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)

    Google Scholar 

  9. Li, J., Yan, H., Zhang, Y.: Efficient identity-based provable multi-copy data possession in multi-cloud storage. IEEE Trans. Cloud Comput. 10(01), 356–365 (2022)

    Article  Google Scholar 

  10. Li, X., et al.: An identity-based data integrity auditing scheme for cloud-based maritime transportation systems. IEEE Trans. Intell. Transp. Syst. 24(2) (2023)

    Google Scholar 

  11. Lin, Y., Li, J., Kimura, S., Yang, Y., Ji, Y., Cao, Y.: Consortium blockchain-based public integrity verification in cloud storage for IoT. IEEE Internet Things J. 9(5), 3978–3987 (2021)

    Article  Google Scholar 

  12. Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)

    Article  MathSciNet  Google Scholar 

  13. Shen, J., Guo, F., Chen, X., Susilo, W.: Secure cloud auditing with efficient ownership transfer. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020, Part I. LNCS, vol. 12308, pp. 611–631. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58951-6_30

    Chapter  Google Scholar 

  14. Shen, W., Qin, J., Yu, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2018)

    Article  Google Scholar 

  15. Shen, W., Yu, J., Yang, M., Hu, J.: Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage. IEEE Trans. Dependable Secure Comput. 20(6), 4593–4606 (2022)

    Article  Google Scholar 

  16. Stamford, C.: Gartner Forecasts Worldwide Device Shipments to Decline 4% in 2023 (2023). https://www.gartner.com/en/newsroom/press-releases/2023-01-31-gartner-forecasts-worldwide-device-shipments-to-decline-four-percent-in-2023

  17. Su, Y., Li, Y., Yang, B., Ding, Y.: Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Trans. Dependable Secure Comput. 19(4), 2838–2850 (2021)

    Article  Google Scholar 

  18. Tian, Y., Tan, H., Shen, J., Pandi, V., Gupta, B.B., Arya, V.: Efficient identity-based multi-copy data sharing auditing scheme with decentralized trust management. Inf. Sci. 644, 119255 (2023)

    Article  Google Scholar 

  19. Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2014)

    Article  Google Scholar 

  20. Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Forensics Secur. 11(6), 1165–1176 (2016)

    Article  Google Scholar 

  21. Wang, M., Xu, L., Hao, R., Yang, M.: Secure auditing and deduplication with efficient ownership management for cloud storage. J. Syst. Architect. 142, 102953 (2023)

    Article  Google Scholar 

  22. Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24632-9_20

    Chapter  Google Scholar 

  23. Zhang, X., Wang, H., Xu, C.: Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Inf. Sci. 472, 223–234 (2019)

    Article  Google Scholar 

  24. Zhang, X., Zhao, J., Xu, C., Wang, H., Zhang, Y.: DOPIV: post-quantum secure identity-based data outsourcing with public integrity verification in cloud storage. IEEE Trans. Serv. Comput. 15(1), 334–345 (2019)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (Grant Nos. 62172096, 62202101, and 62272104).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Futai Zhang .

Editor information

Editors and Affiliations

Appendices

Appendix A: Proof of Theorem 1

Proof

Suppose \(\mathcal {A}_{I}\) is a PPT adversary capable of generating a valid forgery under adaptively choosen file and identity attacks with a non-negligible advantage. We can construct an algorithm \(\mathcal {B}\) that can utilize \(\mathcal {A}_{I}\)’s capabilities to solve the q-SDH problem with a non-negligible advantage.

Algorithm \(\mathcal {B}\) takes as input a q-SDH instance \((g,h,h^\alpha ,h^{\alpha ^2},\dots ,h^{\alpha ^q})\) over the bilinear groups, where \(g\in \mathbb {G}_1,h \in \mathbb {G}_2, g=\psi (h)\), and aims to find a pair \((c,g^{\frac{1}{c+\alpha }})\). \(\mathcal {B}\) interacts with \(\mathcal {A}_{I}\) as follows.

  • Initialization. \(\mathcal {B}\) chooses a generator \(g' \in _R \mathbb {G}_1\) such that it knows \(q-1\) pairs \((w_i,{g'}^{\frac{1}{w_i+\alpha }})\) for \(w_1,w_2,\dots ,w_{q-1} \in _R \mathbb {Z}_p^*\). Indeed, the master public key \(mpk={h'}^\alpha \) also can be computed without the knowledge of \(\alpha \). Specific steps are as follows.

    • It randomly picks \(w_1,w_2,\dots ,w_q \in \mathbb {Z}_p^*\) and expends \(f(x)=\prod _{i=0}^{q-1} (x+w_i) \) to obtain \(\rho _0,\rho _1,\dots ,\rho _q \in \mathbb {Z}_p^*\) so that \(f(x)=\sum _{i=0}^{q} \rho _i x^i\).

    • It sets a generator \(h'=\prod _{i=0}^{q-1} (h^{\alpha ^i} )^{\rho _i}=h^{f(\alpha )} \) and \(g'=\psi (h')=g^{f(\alpha )}\). The public key mpk is fixed to \(\prod _{i=1}^{q} (h^{\alpha ^i} )^{\rho _{i-1}}\) so that \(mpk={h'}^\alpha \) although it does not know \(\alpha \).

    • For \(1 \le i\le q-1\), it expends \(f_i(x)/(x+w_i)=\sum _{i=0}^{q-2} c_i x^i\) and \({\textstyle \prod _{i=0}^{q-2}} \psi ( h^{\alpha ^i} ) ^{c_i} =g^{f_i(\alpha )}=g^{\frac{f(\alpha )}{\alpha +w_i}}={g'}^{\frac{1}{\alpha +w_i}}\). Thus, the pairs \((w_i,{g'}^{\frac{1}{w_i+\alpha }})\) are computed.

  • Queries. \(\mathcal {B}\) initializes a counter \(\zeta \) to 1 and randomly selects a challenge identity \(ID^* \in \left\{ 0,1 \right\} ^* \). And then it controls random oracles to respond to \(\mathcal {A}_{I}\).

    • \(H_1\)-Query\(\left\langle ID\right\rangle \). \(\mathcal {B}\) answers \(w=w_\zeta \) if \(ID\ne ID^*\) and increment \(\zeta \). Otherwise, it returns \(w=w^* \in _R \mathbb {Z}_p^*\) if \(ID=ID^*\). Simultaneously, \(\mathcal {B}\) sustains an initially empty hash list \(L_{H_1}\), logging (IDw) entries.

    • K-Query\(\left\langle ID\right\rangle \). \(\mathcal {B}\) aborts if \(ID=ID^*\). Otherwise, \(\mathcal {B}\) obtains the matching pair \(\left( ID,w \right) \) from \(L_{H_1}\), returns the previously computed \(g'^{\frac{1}{\alpha +w}}\).

    • \(H_2\)-Query\(\left\langle ID, \boldsymbol{F}\right\rangle \). The file \(\boldsymbol{F}\) is encrypted and depicted as \(\boldsymbol{F}=\{(1,\vec{m}_1),\)

      \((2,\vec{m}_2),\dots ,(n,\vec{m}_n)\}\). Additionally, an element \(fid \in \mathbb {Z}_p^*\) is selected as the unique identifier of \(\boldsymbol{F}\). Then, \(\mathcal {B}\) performs the following operations.

      • It picks \(\ell \) random elements \(g_1,g_2,\dots ,g_\ell \in \mathbb {G}_1\) and computes \(M_i=\prod _{j=1}^{\ell } {g_j}^{m_{ij}}\) for each data block \(\vec{m}_i= \left( m_{i1},m_{i2},\dots ,m_{i\ell }\right) \).

      • For \(\left( ID,w \right) \) from \(L_{H_1}\),it computes \(h'_{ID}=h'^w \cdot mpk\) and sets \(H_2(fid \parallel i ) = {\psi (h'_{ID} ) }^{\gamma _i} / M_i\) for each \(i \in [1,n]\), where \(\gamma _i \in \mathbb {Z}_p^*\) .

      • It maintains a hash list \(L_{H_2}\) which is initially empty, responds to \(\mathcal {A}_{I}\) with \(\{{\psi (h'_{ID} ) }^{\gamma _i} / M_i\}_{i\in [1,n]}\), and records \((ID,\boldsymbol{F},fid,h'_{ID}, \{g_j\}_{j\in [1,\ell ]},\)

        \(\{H_2(fid \parallel i )\}_{i\in [1,n]} )\) in \(L_{H_2}\).

    • T-Query\(\left\langle ID,\boldsymbol{F}\right\rangle \). \(\mathcal {B}\) performs the following operations.

      • It aborts if \(ID=ID^*\). Otherwise, It obtians \(\left( ID,w \right) \) from \(L_{H_1}\) and extracts the private key \(g'^{\frac{1}{\alpha +w}} \).

      • It recovers query records from \(L_{H_2}\), chooses \(x_{ID} \in _R \mathbb {Z}_p^*\) and computes \(\sigma _i=g'^{\frac{1}{\alpha +w}}\cdot (H(fid\parallel i)\cdot {\textstyle \prod _{j=1}^{\ell } g_j^{m_{ij}}} )^{x_{ID}}=g'^{\frac{1}{\alpha +w}}\cdot ({\psi (h'_{ID} ) }^{\gamma _i} )^{x_{ID}}\) for \(i\in [1,n]\). Moreover, the verification value \(h''_{ID}=(h'_{ID})^{x_{ID}}\).

      • It encapsulates the file metadata into the file tag \(\tau \).

      • It returns (\(\{(\vec{m}_i,\sigma _i)\}_{1\le i \le n},\tau \)) to \(\mathcal {A}_{I}\) and records \(\tau \) in the set \(\varGamma \).

  • Forgery. Eventually, \(\mathcal {A}_{I}\) outputs (\(ID^*\),\(\tau ^*\),\((i,\vec{m}^*,\sigma ^*)\)). \(\mathcal {A}_{I}\) wins the aforementioned game iff its output satisfies the conditions described in Sect. 3.2.

From \(\sigma _i^*\), \(\mathcal {B}\) can extract \(s_{ID}^*=g^{\frac{1}{\alpha +w^*}}\): it parses \(\tau ^*\) to obtain the verification value \(h''^*_{ID}\), chooses \(\xi _{-1},\xi _0,\dots ,\xi _{q-1} \in _R \mathbb {Z}_p^*\) for which \(f(x) / (x+w^*) = \xi _{-1} / (x+w^*) + \sum _{i=0}^{q-2} \xi _i x^i\) and eventually computes \( S^*={\sigma _i^*}/{\psi \left( h''^*_{ID} \right) ^{\gamma _i}} = g'^{\frac{1}{\alpha +w^*}}\), \(s_{ID^*}=( {S^*}/{\prod _{i=0}^{q-2}\psi ( h^{\alpha ^i})^{\xi _i}})^{\frac{1}{\xi _{-1}}} =g^{\frac{1}{\alpha +w^*}}\). Finally, \(\mathcal {B}\) returns \(\left( w^*,g^{\frac{1}{\alpha +w^*}}\right) \) as the solution to the q-SDH instance.

Appendix B: Proof of Theorem 2

Proof

We prove this theorem by the following series of games and analysis.

Game 0. The first game, the interaction process between \(\mathcal {A}_{II}\) and challenger \(\mathcal {C}\) is defined in the security model of Sect. 3.2.

Game 1. Game 1 mirrors Game 0, except for one variation. The aggregate tag \(\hat{\sigma }\) in \(\mathcal {P}^*\) generated by \(\mathcal {A}_{II}\) differs from the value \(\prod _{(i,c_i)\in \mathcal {Q}} {\sigma _i}^{c_i}\) produced by the ChalProof algorithm based on the challenge \(\textsf{Chal}^*\), yet it can pass the verification of the ProofVerify algorithm, then \(\mathcal {A}_{II}\) wins the game.

Assuming \(\mathcal {A}_{II}\) has a non-negligible probability of winning Game 1, we can construct a simulator to solve the co-CDH problem with a non-negligible advantage. Given \(g\in \mathbb {G}_1,h,h^\alpha \in \mathbb {G}_2\), the simulator aims to outputs \(g^\alpha \in \mathbb {G}_1\). It operates similarly to challenger \(\mathcal {C}\) in Game 0, with the differences as follows:

  • Initialization. It picks an element \(s \in _R \mathbb {Z}_p^*\) as the master secret key msk, and computes \(h^s \in \mathbb {G}_2\) as the master public key mpk.

  • Store. \(\mathcal {A}_{II}\) adaptively initiates K-Query and T-Query to \(\mathcal {C}\) as follows:

    • K-Query\(\left\langle ID\right\rangle \). It returns the private key \(s_{ID}=g^{\frac{1}{H_1(ID)+s}}\) to \(\mathcal {A}_{II}\) and records \((ID,H_1(ID),s_{ID})\) in the list.

    • T-Query\(\left\langle ID,\boldsymbol{F}\right\rangle \). The file \(\boldsymbol{F}\) is encrypted and depicted as \(\{m_{ij}\}_{1\le i \le n,1 \le j \le \ell }\) where \(m_{ij} \in \mathbb {Z}_p\). Additionally, an element \(fid \in \mathbb {Z}_p^*\) is selected as the unique identifier of \(\boldsymbol{F}\). Then, \(\mathcal {B}\) performs the following operations.

      • It selects a random element \(\pi \in \mathbb {Z}_p^*\), and computes the verification value \(h^\theta =\left( h^\alpha \right) ^\pi \), which implies \(\theta =\alpha \pi \). For \(i\in [1,n]\), it picks \(\pi _i \in _R \mathbb {Z}_p^*\) and sets \(H_2(fid \parallel i) =\psi (h)^{\pi _i}/ ( \psi (h)^{\sum _{j=1}^{\ell } m_{ij}\beta _j} \cdot g^{\sum _{j=1}^{\ell } m_{ij}\delta _j})\).

      • It obtians \((ID,H_1(ID),s_{ID})\) from the list, computes \(h'_{ID}=h^{H_1(ID)}\cdot mpk\), \(h''_{ID}={h'}_{ID}^\theta ={\left( h^\theta \right) }^{s+H_1(ID)}\), and encapsulates the file metadata into the file tag \(\tau \).

      • Since \(H_2(fid\parallel i) \cdot \prod _{j=1}^{\ell } {g_j}^{m_{ij}}=\psi (h)^{\pi _i } \) it can computes \(\sigma _i=s_{{ID}} \cdot ( H_2({fid} \parallel i) \cdot \prod _{j=1}^{\ell } {g_j}^{{m_{ij}}})^\theta =s_{{ID}} \cdot \psi (h^\theta )^{\pi _i }\).

      • Finally, it returns (\(\{(\vec{m}_i,\sigma _i)\}_{1\le i \le n},\tau \)) to \(\mathcal {A}_{II}\).

  • Forgery. Finally, \(\mathcal {A}_{II}\) outputs a proof of data possession \(\mathcal {P}^*\) for a challenge file \(\boldsymbol{F}^*\) with the tag \(\tau ^*\) under the identity \(ID^*\), where \(\boldsymbol{F}^*\) is incompletely stored and \(\mathcal {P}^*\) is generated based on the challenge \(\textsf{Chal}^*=(\tau ^*,\mathcal {Q}^*=\lbrace (i,c_i) \rbrace )\) launched by \(\mathcal {C}\) for \(\boldsymbol{F}^*\). \(\mathcal {A}_{II}\) wins the aforementioned game iff its output satisfies the conditions described in Sect. 3.2.

Analysis. Suppose \(\mathcal {A}_{II}\)’s \(\mathcal {P}^*\) responses to \(\textsf{Chal}^*\) is \(( \hat{\mu _1},\dots ,\hat{\mu _\ell }) \) together with \(\hat{\sigma }\). Let \(( \mu _1,\dots ,\mu _\ell ) \) and \(\sigma \) be \(\mathcal {P}\) generated correctly using ChalProof based on \(\textsf{Chal}^*\), where \(\sigma =\prod _{(i,c_i)\in \mathcal {Q}} {\sigma _i}^{c_i}\) and \(\mu _j=\sum _{(i,c_i)\in \mathcal {Q}} c_i m_{ij} \) for \(1 \le j \le \ell \). By the correctness of the proof, we know the \(\mathcal {A}_{II}\)’s \(\mathcal {P}^*\) and the correct one satisfies the verification equation:

$$\begin{aligned} e\left( \hat{\sigma },h'_{ID} \right) = T^{\sum _{(i,c_i)\in \mathcal {Q} } c_i} \cdot e\left( {\textstyle \prod _{(i,c_i)\in \mathcal {Q}} } {H_2(fid^* \parallel i)}^{c_i} \cdot {\textstyle \prod _{j=1}^{\ell } }{g_j}^{\hat{\mu _j}},h''_{ID} \right) , \end{aligned}$$
(2)
$$\begin{aligned} e\left( \sigma ,h'_{ID} \right) = T^{\sum _{(i,c_i)\in \mathcal {Q} } c_i} \cdot e\left( {\textstyle \prod _{(i,c_i)\in \mathcal {Q}} } {H_2(fid^* \parallel i)}^{c_i} \cdot {\textstyle \prod _{j=1}^{\ell }} {g_j}^{\mu _j},h''_{ID} \right) . \end{aligned}$$
(3)

Indeed, if \(\hat{\mu _j} = \mu _j\) for each j, it can be deduced that \(\hat{\sigma } = \sigma \), contradicting our previous assumption. Let \(\varDelta \mu _j= \mu _j-\hat{\mu _j}\). Dividing equation (2) by equation (3), we have \(e(\hat{\sigma } / \sigma ,h'_{ID}) =e({\textstyle \prod _{j=1}^{\ell }}{g_j}^{\varDelta \mu _j},( {h'_{ID}}) ^{\theta }~\hbox {)} =e( \psi (h)^{\sum _{j=1}^{\ell }\beta _j\varDelta \mu _j}\cdot g^{\sum _{j=1}^{\ell }\delta _j\varDelta \mu _j},(h^\theta )^{s+H_1(ID)} ).\) Rearranging, we get \( e(\hat{\sigma }\cdot \sigma ^{-1}\cdot \psi (h^\theta )^{-\sum _{j=1}^{\ell }\beta _j\varDelta \mu _j}, h'_{ID}) =e(g, (h^\theta )^{s+H_1(ID)})^{\sum _{j=1}^{\ell }\delta _j\varDelta \mu _j}. \) Thus, \(g^\alpha =(\hat{\sigma }\cdot \sigma ^{-1}\cdot \psi (h^\theta )^{-\sum _{j=1}^{\ell }\beta _j\varDelta \mu _j} )^{\frac{1}{\pi \sum _{j=1}^{\ell }\delta _j\varDelta \mu _j}}\) is the solution of the given co-CDH instance as long as \(\pi \sum _{j=1}^{\ell }\delta _j\varDelta \mu _j \ne 0\; \text {mod}\; p\). Since we note that not all of \(\lbrace \varDelta \mu _j\rbrace \) can be zero and \(\pi ,\delta _j\) for \(1 \le j \le \ell \) are random values and information theoretically hidden from \(\mathcal {A}_{II}\), so the probability \(\text {Pr}\left[ \pi \sum _{j=1}^{\ell }\delta _j\varDelta \mu _j=0 \; \text {mod}\; p \right] =1/p \), which is negligible.

Thus if there is a non-negligible difference between \(\mathcal {A}_{II}\)’s probabilities of success in Games 0 and 1, we can construct a simulator that utilizes \(\mathcal {A}_{II}\) to solve co-CDH problem.

Game 2. Game 1 mirrors Game 0, except for one variation. At least one aggregate data block \(\hat{\mu _j}\) in \(\mathcal {P}^*\) is not equal to the value \(\sum _{(i,c_i)\in \mathcal {Q}} c_i m_{ij}\) generated using the ChalProof algorithm based on the challenge \(\textsf{Chal}^*\), yet it can pass the verification of the ProofVerify algorithm, then \(\mathcal {A}_{II}\) wins the game.

Assuming that the probability of \(\mathcal {A}_{II}\) winning Game 2 is non-negligible,e can construct a simulator that utilizes \(\mathcal {A}_{II}\) to solve the DL problem with a non-negligible advantage. Given \(g,k \in \mathbb {G}_1\), the simulator aims to find a value \(\alpha \) such that \(k=g^\alpha \). It behaves like the \(\mathcal {C}\) in Game 1, but with the following differences:

  • Store. It responds to K-Query and T-Query in the same way as Game 1, expect that for each sector j, \(1\le j \le \ell \), it picks \(\beta _j,\delta _j \in _R \mathbb {Z}_p^*\) and sets \(g_j=g^{\beta _j} \cdot k^{\delta _j}\).

  • Forgery. The conditions for \(\mathcal {A}_{II}\) to win the above game are the same as those in Game 1.

Analysis. In \(\mathcal {A}_{II}\)’s response \(\mathcal {P}^*\), there is at least one \(\lbrace \hat{\mu _j} \rbrace \) is not equal to the correct \(\lbrace \mu _j \rbrace \) generated using the ChalProof algorithm based on \(\textsf{Chal}^*\). Because of the change made in Game 1 we know that \(\hat{\sigma }=\sigma \). Equating the verification equations gives us \(T^{\sum _{(i,c_i)\in \mathcal {Q} } c_i} \cdot e({\textstyle \prod _{(i,c_i)\in \mathcal {Q}} } {H_2(fid^* \parallel i)}^{c_i} \cdot {\textstyle \prod _{j=1}^{\ell }} {g_j}^{\hat{\mu _j}},h''_{ID} ) =e(\hat{\sigma },h'_{ID} ) =e\left( \sigma , h'_{ID} \right) =T^{\sum _{(i,c_i)\in \mathcal {Q} } c_i} \cdot e({\textstyle \prod _{(i,c_i)\in \mathcal {Q}} } {H_2(fid^* \parallel i)}^{c_i} \cdot {\textstyle \prod _{j=1}^{\ell }} {g_j}^{\mu _j},h''_{ID} )\), and further implies that \({\textstyle \prod _{j=1}^{\ell }} {g_j}^{\hat{\mu _j}} ={\textstyle \prod _{j=1}^{\ell }} {g_j}^{{\mu _j}}.\) Let \(\varDelta \mu _j=\hat{\mu _j}-\mu _j\) for each \(1\le j\le \ell \), and we get \( ~\hbox {1} ={\textstyle \prod _{j=1}^{\ell }} {g_j}^{\varDelta {\mu _j}} ={\textstyle \prod _{j=1}^{\ell }} \left( {g^{\beta _j}\cdot k^{\delta _j}}\right) ^{\varDelta {\mu _j}} =g^{\sum _{j=1}^{\ell }\beta _j\varDelta \mu _j}\cdot k^{\sum _{j=1}^{\ell }\delta _j\varDelta \mu _j}.\) Thus, \(\alpha =-{\sum _{j=1}^{\ell }\beta _j\varDelta \mu _j}/{\sum _{j=1}^{\ell }\delta _j\varDelta \mu _j}\; \text {mod} \; p\) is the solution of the given DL instance, as long as \(\sum _{j=1}^{\ell }\delta _j\varDelta \mu _j \ne 0\; \text {mod}\; p\). Since not all of \(\lbrace \varDelta \mu _j\rbrace \) can be zero and \(\delta _j\) for each j are random values and information theoretically hidden from \(\mathcal {A}_{II}\), we know \(\text {Pr}\left[ \sum _{j=1}^{\ell }\delta _j\varDelta \mu _j=0 \; \text {mod}\; p \right] =1/p \), which is negligible.

Thus if there is a non-negligible difference between \(\mathcal {A}_{II}\)’s probabilities of success in Games 1 and 2, we can construct a simulator that utilizes \(\mathcal {A}_{II}\) to solve DL problem.

In Game 2, assuming the Barreto et al.’s IBS scheme for file tag \(\tau \) generation and the TagGen algorithm for block tags are existentially unforgeable, and co-CDH problem and DL problem are hard in bilinear groups, there is only a negligible difference in the success probability of \(\mathcal {A}_{II}\) in this game compared to Game 0. Moreover, since the hardness of co-CDH problem implies that of DL problem, we complete the proof of Theorem 2 by combing Game 0, Game 1 and Game 2.

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, Y., Zhang, F., Yang, W., Yang, S. (2025). Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices. In: Chen, X., Huang, X., Yung, M. (eds) Data Security and Privacy Protection. DSPP 2024. Lecture Notes in Computer Science, vol 15216. Springer, Singapore. https://doi.org/10.1007/978-981-97-8546-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-8546-9_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-8545-2

  • Online ISBN: 978-981-97-8546-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy