支持组用户授权管理的共享数据完整性验证方案
作者:

Integrity Verification Scheme for Shared Data Enabling Group User Authorization Management
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [22]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    本文旨在解决共享医疗数据场景下的群组用户授权管理与完整性验证问题. 首先, 为防止群组用户越权操作, 引入授权标识符, 医疗数据持有者凭授权标识符, 结合用户身份完成权限分配; 而授权标识符的数学构造可有效保证其不可伪造性. 其次, 为记录撤销用户并剥夺其访问权限, 引入基于跳表设计的撤销用户表; 跳表的快速查找和插入的特性, 使方案撤销用户的开销仅为${\mathrm{O}}(\log n)$. 随后, 完善了共享数据完整性验证的具体流程与数学设计. 最后通过安全性分析和仿真实验证明了方案的安全性和高效性.

    Abstract:

    This study is designed to address the issues of group user authorization management and integrity verification for shared medical data. First, to prevent group users from overstepping their authority, authorization identifiers are introduced. Medical data owners use authorization identifiers to allocate different access rights to group users, according to user identities. The mathematical construction of authorization identifiers effectively ensures that it cannot be forged. Second, to record revoked users and deprive them of access rights, a revoked user list based on a skip list is introduced. As skip list can support fast lookup and insertion, the overhead of revoking a user is only O(logn). Afterward, the concrete process and mathematical design of shared data integrity verification are improved. Finally, the security analysis and simulation experiments prove the security and efficiency of the scheme.

    参考文献
    [1] Yenugula M, Sahoo SK, Goswami SS. Cloud computing for sustainable development: An analysis of environmental, economic and social benefits. Journal of Future Sustainability, 2024, 4(1): 59–66.
    [2] Shen JY, Zeng P, Choo KKR, et al. A certificateless provable data possession scheme for cloud-based EHRs. IEEE Transactions on Information Forensics and Security, 2023, 18: 1156–1168.
    [3] Liu ZP, Ren LL, Feng YJ, et al. Data integrity audit scheme based on quad Merkle tree and blockchain. IEEE Access, 2023, 11: 59263–59273.
    [4] Gordon WJ, Catalini C. Blockchain technology for healthcare: Facilitating the transition to patient-driven interoperability. Computational and Structural Biotechnology Journal, 2018, 16: 224–230.
    [5] Agapito G, Cannataro M. An overview on the challenges and limitations using cloud computing in healthcare corporations. Big Data and Cognitive Computing, 2023, 7(2): 68.
    [6] 张晓均, 王鑫, 廖文才, 等. 支持条件身份匿名的云存储医疗数据轻量级完整性验证方案. 电子与信息学报, 2022, 44(12): 4348–4356.
    [7] 王宏远, 祝烈煌, 李龙一佳. 云存储中支持数据去重的群组数据持有性证明. 软件学报, 2016, 27(6): 1417–1431.
    [8] 王少辉, 赵铮宇, 王化群, 等. 对一个基于身份远程数据完整性验证方案的分析与改进. 计算机科学, 2023, 50(7): 302–307.
    [9] Qi YN, Luo YB, Huang YF, et al. Blockchain-based privacy-preserving group data auditing with secure user revocation. Computer Systems Science and Engineering, 2023, 45(1): 183–199.
    [10] Huang YH, Shen WT, Qin J, et al. Privacy-preserving certificateless public auditing supporting different auditing frequencies. Computers & Security, 2023, 128: 103181.
    [11] Trivedi C, Parmar K, Rao UP. PGASH: Provable group-based authentication scheme for Internet of Healthcare Things. Peer-to-peer Networking and Applications, 2024, 17(2): 665–684.
    [12] Wang BY, Li BC, Li H. Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transactions on Cloud Computing, 2014, 2(1): 43–56.
    [13] Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security. Alexandria: ACM, 2007. 598-609.
    [14] Wang C, Chow SSM, Wang Q, et al. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 2013, 62(2): 362–375.
    [15] Wang BY, Li BC, Li H. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on Services Computing, 2015, 8(1): 92–106.
    [16] 付安民, 秦宁元, 宋建业, 等. 云端多管理者群组共享数据中具有隐私保护的公开审计方案. 计算机研究与发展, 2015, 52(10): 2353–2362.
    [17] Zhang Y, Yu J, Hao R, et al. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Transactions on Dependable and Secure Computing, 2020, 17(3): 608–619.
    [18] He K, Chen J, Yuan Q, et al. Dynamic group-oriented provable data possession in the cloud. IEEE Transactions on Dependable and Secure Computing, 2021, 18(3): 1394–1408.
    [19] Deng C, He MX, Wen XY, et al. Support efficient user revocation and identity privacy in integrity auditing of shared data. Proceedings of the 7th International Conference on Cloud Computing and Big Data Analytics. Chengdu: IEEE, 2022. 221-229.
    [20] Li YP, Li YZ, Zhang K, et al. Public integrity auditing for dynamic group cooperation files with efficient user revocation. Computer Standards & Interfaces, 2023, 83: 103641.
    [21] Yang G, Han LD, Bi JG, et al. A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. Cluster Computing, 2024, 27(2): 2165–2179.
    [22] Pugh W. Skip lists: A probabilistic alternative to balanced trees. Communications of the ACM, 1990, 33(6): 668–676.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

张邓凡,袁艺林,杨帆,李子臣.支持组用户授权管理的共享数据完整性验证方案.计算机系统应用,2024,33(8):98-107

复制
分享
文章指标
  • 点击次数:323
  • 下载次数: 849
  • HTML阅读次数: 538
  • 引用次数: 0
历史
  • 收稿日期:2024-02-22
  • 最后修改日期:2024-03-19
  • 在线发布日期: 2024-06-28
文章二维码
您是第11418602位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号