Caiyuan Tang , Feng Wang , Chenbin Zhao , Hui Cui , Zuobin Ying , Ching-Chun Chang , Chin-Chen Chang
{"title":"FM-DPDP:具有灵活存储的细粒度多拷贝动态可证明数据占有","authors":"Caiyuan Tang , Feng Wang , Chenbin Zhao , Hui Cui , Zuobin Ying , Ching-Chun Chang , Chin-Chen Chang","doi":"10.1016/j.jisa.2025.104262","DOIUrl":null,"url":null,"abstract":"<div><div>In recent years, the widespread adoption of cloud storage has surged alongside the rapid and exponential increase in data. However, cloud storage also brings an integrity threat with remote data. Consequently, many schemes have been proposed to safeguard remote data integrity. In these researches, multicopy Provable data possession (PDP) is an effective method for enhancing data security. Unfortunately, most existing schemes only support integer multiples of copies, which may reduce the practicality of these schemes. In this paper, we use the Ternary Copy Hash Tree (TCHT) as a dynamic structure to propose a Fine-grained Multicopy Dynamic Provable Data Possession (FM-DPDP) scheme. Unlike traditional multicopy PDP, which only supports an integer number of copies, FM-DPDP supports fine-grained replication. This means that the number of replicas can be any rational number greater than 1. Furthermore, The FM-DPDP also supports, data restoration, privacy preservation and data dynamics. The security analysis demonstrates that the proposed scheme is correct and unforgeability. Besides, we compare FM-DPDP with other relevant schemes. The evaluation indicates that our scheme offers additional functionalities while maintaining comparable computational cost and communication efficiency to other schemes.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"95 ","pages":"Article 104262"},"PeriodicalIF":3.7000,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FM-DPDP: Fine-grained Multicopy Dynamic Provable Data Possession with flexible storage\",\"authors\":\"Caiyuan Tang , Feng Wang , Chenbin Zhao , Hui Cui , Zuobin Ying , Ching-Chun Chang , Chin-Chen Chang\",\"doi\":\"10.1016/j.jisa.2025.104262\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In recent years, the widespread adoption of cloud storage has surged alongside the rapid and exponential increase in data. However, cloud storage also brings an integrity threat with remote data. Consequently, many schemes have been proposed to safeguard remote data integrity. In these researches, multicopy Provable data possession (PDP) is an effective method for enhancing data security. Unfortunately, most existing schemes only support integer multiples of copies, which may reduce the practicality of these schemes. In this paper, we use the Ternary Copy Hash Tree (TCHT) as a dynamic structure to propose a Fine-grained Multicopy Dynamic Provable Data Possession (FM-DPDP) scheme. Unlike traditional multicopy PDP, which only supports an integer number of copies, FM-DPDP supports fine-grained replication. This means that the number of replicas can be any rational number greater than 1. Furthermore, The FM-DPDP also supports, data restoration, privacy preservation and data dynamics. The security analysis demonstrates that the proposed scheme is correct and unforgeability. Besides, we compare FM-DPDP with other relevant schemes. The evaluation indicates that our scheme offers additional functionalities while maintaining comparable computational cost and communication efficiency to other schemes.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"95 \",\"pages\":\"Article 104262\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625002996\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002996","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
FM-DPDP: Fine-grained Multicopy Dynamic Provable Data Possession with flexible storage
In recent years, the widespread adoption of cloud storage has surged alongside the rapid and exponential increase in data. However, cloud storage also brings an integrity threat with remote data. Consequently, many schemes have been proposed to safeguard remote data integrity. In these researches, multicopy Provable data possession (PDP) is an effective method for enhancing data security. Unfortunately, most existing schemes only support integer multiples of copies, which may reduce the practicality of these schemes. In this paper, we use the Ternary Copy Hash Tree (TCHT) as a dynamic structure to propose a Fine-grained Multicopy Dynamic Provable Data Possession (FM-DPDP) scheme. Unlike traditional multicopy PDP, which only supports an integer number of copies, FM-DPDP supports fine-grained replication. This means that the number of replicas can be any rational number greater than 1. Furthermore, The FM-DPDP also supports, data restoration, privacy preservation and data dynamics. The security analysis demonstrates that the proposed scheme is correct and unforgeability. Besides, we compare FM-DPDP with other relevant schemes. The evaluation indicates that our scheme offers additional functionalities while maintaining comparable computational cost and communication efficiency to other schemes.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.