{"title":"Append-only Authenticated Data Sets based on RSA accumulators for transparent log system","authors":"Qiang Tong, Long Yin, Yulong Liu, Jian Xu","doi":"10.1016/j.csi.2025.103978","DOIUrl":null,"url":null,"abstract":"<div><div>Authenticated Data Structures (ADS) play a vital role in ensuring data authenticity in cloud computing environments, particularly in Public Key Infrastructure (PKI). Despite their importance, significant concerns remain about cloud computing security, such as the risk of hijacking certification authorities to issue fraudulent certificates or tampering with log entries. While Certificate Transparency (CT) improves server certificate credibility, CT log servers remain vulnerable, risking data integrity and trust. This paper proposes the Append-only Authenticated Data Sets (AADS) model, which enhances cloud computing security by supporting append-only properties and fork consistency in transparent logs, preventing malicious modifications and preserving divergent log views. Formally defined using RSA accumulators, the model includes efficient algorithms for initialization, data addition, search, and evidence verification, ensuring security under strong RSA and adaptive root assumptions while reducing space complexity. Additionally, Append-only Authenticated Dictionaries (AAD) offer better space and communication efficiency. A prototype transparent log system demonstrates how these structures mitigate identity authentication risks caused by missing append-only features and fork consistency. Key challenges remain, including scalability, cryptographic weaknesses, and coordinated attacks by compromised log servers and malicious entities.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103978"},"PeriodicalIF":4.1000,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Standards & Interfaces","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0920548925000078","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Authenticated Data Structures (ADS) play a vital role in ensuring data authenticity in cloud computing environments, particularly in Public Key Infrastructure (PKI). Despite their importance, significant concerns remain about cloud computing security, such as the risk of hijacking certification authorities to issue fraudulent certificates or tampering with log entries. While Certificate Transparency (CT) improves server certificate credibility, CT log servers remain vulnerable, risking data integrity and trust. This paper proposes the Append-only Authenticated Data Sets (AADS) model, which enhances cloud computing security by supporting append-only properties and fork consistency in transparent logs, preventing malicious modifications and preserving divergent log views. Formally defined using RSA accumulators, the model includes efficient algorithms for initialization, data addition, search, and evidence verification, ensuring security under strong RSA and adaptive root assumptions while reducing space complexity. Additionally, Append-only Authenticated Dictionaries (AAD) offer better space and communication efficiency. A prototype transparent log system demonstrates how these structures mitigate identity authentication risks caused by missing append-only features and fork consistency. Key challenges remain, including scalability, cryptographic weaknesses, and coordinated attacks by compromised log servers and malicious entities.
期刊介绍:
The quality of software, well-defined interfaces (hardware and software), the process of digitalisation, and accepted standards in these fields are essential for building and exploiting complex computing, communication, multimedia and measuring systems. Standards can simplify the design and construction of individual hardware and software components and help to ensure satisfactory interworking.
Computer Standards & Interfaces is an international journal dealing specifically with these topics.
The journal
• Provides information about activities and progress on the definition of computer standards, software quality, interfaces and methods, at national, European and international levels
• Publishes critical comments on standards and standards activities
• Disseminates user''s experiences and case studies in the application and exploitation of established or emerging standards, interfaces and methods
• Offers a forum for discussion on actual projects, standards, interfaces and methods by recognised experts
• Stimulates relevant research by providing a specialised refereed medium.