Hierarchical remote data possession checking method based on massive cloud files

被引:0
|
作者
Haifeng M. [1 ,2 ]
Zhenguo G. [1 ]
Nianmin Y. [3 ]
机构
[1] College of Automation, Harbin Engineering University, Harbin
[2] Institute for Computer and Information Engineering, Heilongjiang University of Science and Technology, Harbin
[3] College of Computer Sciences and Technology, Dalian University of Technology, Dalian
来源
Haifeng, Ma (mhf_2000@163.com) | 1600年 / SAGE Publications Inc.卷 / 11期
基金
中国国家自然科学基金;
关键词
Cloud storage; Data integrity; Hash tree; Homomorphic tag; Provable data possession;
D O I
10.1177/1748301816682243
中图分类号
学科分类号
摘要
Cloud storage service enables users to migrate their data and applications to the cloud, which saves the local data maintenance and brings great convenience to the users. But in cloud storage, the storage servers may not be fully trustworthy. How to verify the integrity of cloud data with lower overhead for users has become an increasingly concerned problem. Many remote data integrity protection methods have been proposed, but these methods authenticated cloud files one by one when verifying multiple files. Therefore, the computation and communication overhead are still high. Aiming at this problem, a hierarchical remote data possession checking (hierarchical-remote data possession checking (H-RDPC)) method is proposed, which can provide efficient and secure remote data integrity protection and can support dynamic data operations. This paper gives the algorithm descriptions, security, and false negative rate analysis of H-RDPC. The security analysis and experimental performance evaluation results show that the proposed H-RDPC is efficient and reliable in verifying massive cloud files, and it has 32–81% improvement in performance compared with RDPC. © The Author(s) 2016.
引用
收藏
页码:126 / 134
页数:8
相关论文
共 50 条
  • [1] Data dynamics for remote data possession checking in cloud storage
    Chen, Lanxiang
    Zhou, Shuming
    Huang, Xinyi
    Xu, Li
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2413 - 2424
  • [2] A hill cipher-based remote data possession checking in cloud storage
    Chen, Lanxiang
    Guo, Gongde
    Peng, Zhen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 511 - 518
  • [3] On the Security of a Remote Data Possession Checking Scheme in Cloud Storage
    Liang, XinLong
    Jiang, Rui
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 96 - 99
  • [4] Remote data possession checking with enhanced security for cloud storage
    Yu, Yong
    Zhang, Yafang
    Ni, Jianbing
    Au, Man Ho
    Chen, Lanxiang
    Liu, Hongyu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 77 - 85
  • [5] An Improved Remote Data Possession Checking Protocol in Cloud Storage
    Zhou, Enguang
    Li, Zhoujun
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 611 - 617
  • [6] Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage
    Luo Yuchuan
    Fu Shaojing
    Xu Ming
    Wang Dongsheng
    [J]. CHINA COMMUNICATIONS, 2014, 11 (11) : 114 - 124
  • [7] A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Han, Jinguang
    Zhang, Yichen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 78 - 88
  • [8] Improved security of a dynamic remote data possession checking protocol for cloud storage
    Yu, Yong
    Ni, Jianbing
    Au, Man Ho
    Liu, Hongyu
    Wang, Hua
    Xu, Chunxiang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (17) : 7789 - 7796
  • [9] Remote data possession checking with privacy-preserving authenticators for cloud storage
    Shen, Wenting
    Yang, Guangyang
    Yu, Jia
    Zhang, Hanlin
    Kong, Fanyu
    Hao, Rong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 136 - 145
  • [10] A Remote File Possession Checking Protocol in a Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 115 - 121