Title: A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function

Authors: Wei Ren; Yuliang Liu

Addresses: School of Computer Science, China University of Geosciences, Wuhan, 430074, China; Shandong Provincial Key Laboratory of Computer Network, Jinan, 250014, China ' School of Computer Science, China University of Geosciences, Wuhan, 430074, China

Abstract: In mobile cloud computing, mobile users usually upload working documents into cloud servers to facilitate pervasively accessing via mobile devices and ubiquitously cooperating among members in a mobile group. During periods between uploading and downloading files, the possession of original file at cloud servers needs to be proofed to mobile requesters upon file retrieval. Any mobile user or device can verify that cloud servers indeed possess the designated uploading file before any concrete downloading procedure. Moreover, such verification procedure should not induce much overhead in terms of computation, storage and communication for mobile devices. In this paper, we propose a family of schemes to address this problem without relying on any third party auditor or authority. They are named as randomly sampling check protocol, random commitment check protocol, and chameleon hash function-based protocol. All schemes are lightweight in terms of computation, storage and communication. The evaluation of security and performance is extensively analysed, justifying the applicability of the proposed schemes. We finally propose a general protocol (model) for remote possession proof to reveal the fundamental components in the protocols for dedicated security goal. Such general protocol unveils a uniform framework for possession proof protocols.

Keywords: mobile cloud computing; MCC; possession proof; integrity checks; storage security; outsourced files; chameleon hash function.

DOI: 10.1504/IJCSE.2014.060715

International Journal of Computational Science and Engineering, 2014 Vol.9 No.4, pp.339 - 346

Received: 30 Jan 2012
Accepted: 20 Apr 2012

Published online: 24 May 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article