Loading…

Dynamic authenticated data structures with access control for outsourcing data stream

Today, many resource-constrained terminal devices prefer to outsource data stream to an intermediary for managing and storing. However, within this growing trend, the trusted problem of outsourcing data stream is universally concerned. It is extremely critical to prove that the data stream provided...

Full description

Saved in:
Bibliographic Details
Published in:IET information security 2017-09, Vol.11 (5), p.235-242
Main Authors: Sun, Yi, Chen, Xingyuan, Du, Xuehui, Xu, Jian
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Today, many resource-constrained terminal devices prefer to outsource data stream to an intermediary for managing and storing. However, within this growing trend, the trusted problem of outsourcing data stream is universally concerned. It is extremely critical to prove that the data stream provided by the third party is trust. Therefore, in order to efficiently and effectively verify the trusted of the outsourcing data stream with adequate control, this study presents a kind of dynamic authenticated data structure with access control on outsourced data stream. Based on this data structure, the authors are able to establish a novel authentication scheme, which can support data stream to add and update in real time and verification with fine-grained access control. In addition, the security and efficiency of the proposed scheme are analysed in this study. Through comparing and analysing with the existing schemes, the proposed scheme has higher security and efficiency in terms of data stream addition and update.
ISSN:1751-8709
1751-8717
1751-8717
DOI:10.1049/iet-ifs.2015.0243