{"title":"Enable Owner Transfer and Data Traceability in Public Auditing Scheme for Cloud Digital Content","authors":"Yanting Wang, Yilin Yuan, Shisong Yang, Zichen Li","doi":"10.1002/cpe.70309","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Currently, sharing digital content significantly enhances the value of data, and data purchasing serves as a means of realizing this value after sharing. After a data purchase transaction occurs, although the ownership of the data has been successfully transferred, this process introduces two major challenges: first, maintaining the continuity of cloud data integrity verification after ownership transfers, and second, enabling full-lifecycle traceability of data to clarify copyright attribution. To address these issues, this paper proposes a public auditing scheme that supports both cloud data ownership transfer and data traceability. First, the proposed scheme introduces an update factor as a mathematical structure to enable the update of HVT (homomorphic verifiable tag) on the cloud. Meanwhile, the CS (cloud service) performs tag update computations, thereby ensuring security while reducing the computational and communication overhead for local users. Furthermore, to achieve transparency throughout the data's lifecycle, copyright information of digital content is embedded into blockchain transactions. A data traceability strategy is then designed leveraging a chameleon hash function, and a detailed traceability process is presented. Security analysis demonstrates that our scheme satisfies correctness and reliability, and a series of comparative experiments further validate its feasibility and efficiency in practical applications.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 25-26","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70309","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
Currently, sharing digital content significantly enhances the value of data, and data purchasing serves as a means of realizing this value after sharing. After a data purchase transaction occurs, although the ownership of the data has been successfully transferred, this process introduces two major challenges: first, maintaining the continuity of cloud data integrity verification after ownership transfers, and second, enabling full-lifecycle traceability of data to clarify copyright attribution. To address these issues, this paper proposes a public auditing scheme that supports both cloud data ownership transfer and data traceability. First, the proposed scheme introduces an update factor as a mathematical structure to enable the update of HVT (homomorphic verifiable tag) on the cloud. Meanwhile, the CS (cloud service) performs tag update computations, thereby ensuring security while reducing the computational and communication overhead for local users. Furthermore, to achieve transparency throughout the data's lifecycle, copyright information of digital content is embedded into blockchain transactions. A data traceability strategy is then designed leveraging a chameleon hash function, and a detailed traceability process is presented. Security analysis demonstrates that our scheme satisfies correctness and reliability, and a series of comparative experiments further validate its feasibility and efficiency in practical applications.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.