A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function
by Wei Ren; Yuliang Liu
International Journal of Computational Science and Engineering (IJCSE), Vol. 9, No. 4, 2014

Abstract: In mobile cloud computing, mobile users usually upload working documents into cloud servers to facilitate pervasively accessing via mobile devices and ubiquitously cooperating among members in a mobile group. During periods between uploading and downloading files, the possession of original file at cloud servers needs to be proofed to mobile requesters upon file retrieval. Any mobile user or device can verify that cloud servers indeed possess the designated uploading file before any concrete downloading procedure. Moreover, such verification procedure should not induce much overhead in terms of computation, storage and communication for mobile devices. In this paper, we propose a family of schemes to address this problem without relying on any third party auditor or authority. They are named as randomly sampling check protocol, random commitment check protocol, and chameleon hash function-based protocol. All schemes are lightweight in terms of computation, storage and communication. The evaluation of security and performance is extensively analysed, justifying the applicability of the proposed schemes. We finally propose a general protocol (model) for remote possession proof to reveal the fundamental components in the protocols for dedicated security goal. Such general protocol unveils a uniform framework for possession proof protocols.

Online publication date: Sat, 24-May-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Computational Science and Engineering (IJCSE):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com