Hierarchical remote data possession checking method based on massive cloud files

被引:0
|
作者
Haifeng M. [1 ,2 ]
Zhenguo G. [1 ]
Nianmin Y. [3 ]
机构
[1] College of Automation, Harbin Engineering University, Harbin
[2] Institute for Computer and Information Engineering, Heilongjiang University of Science and Technology, Harbin
[3] College of Computer Sciences and Technology, Dalian University of Technology, Dalian
来源
Haifeng, Ma (mhf_2000@163.com) | 1600年 / SAGE Publications Inc.卷 / 11期
基金
中国国家自然科学基金;
关键词
Cloud storage; Data integrity; Hash tree; Homomorphic tag; Provable data possession;
D O I
10.1177/1748301816682243
中图分类号
学科分类号
摘要
Cloud storage service enables users to migrate their data and applications to the cloud, which saves the local data maintenance and brings great convenience to the users. But in cloud storage, the storage servers may not be fully trustworthy. How to verify the integrity of cloud data with lower overhead for users has become an increasingly concerned problem. Many remote data integrity protection methods have been proposed, but these methods authenticated cloud files one by one when verifying multiple files. Therefore, the computation and communication overhead are still high. Aiming at this problem, a hierarchical remote data possession checking (hierarchical-remote data possession checking (H-RDPC)) method is proposed, which can provide efficient and secure remote data integrity protection and can support dynamic data operations. This paper gives the algorithm descriptions, security, and false negative rate analysis of H-RDPC. The security analysis and experimental performance evaluation results show that the proposed H-RDPC is efficient and reliable in verifying massive cloud files, and it has 32–81% improvement in performance compared with RDPC. © The Author(s) 2016.
引用
收藏
页码:126 / 134
页数:8
相关论文
共 50 条
  • [31] An Efficient Method for Checking the Integrity of Data in the Cloud
    Tan Shuang
    Tan Lin
    Li Xiaoling
    Jia Yan
    [J]. CHINA COMMUNICATIONS, 2014, 11 (09) : 68 - 81
  • [32] Multiple-File Remote Data Checking for cloud storage
    Xiao, Da
    Yang, Yan
    Yao, Wenbin
    Wu, Chunhua
    Liu, Jianyi
    Yang, Yixian
    [J]. COMPUTERS & SECURITY, 2012, 31 (02) : 192 - 205
  • [33] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [34] Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated
    Dang, Hung
    Purwanto, Erick
    Chang, Ee-Chien
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 408 - 422
  • [35] Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
    Wang, Huaqun
    He, Debiao
    Tang, Shaohua
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1165 - 1176
  • [36] An enhanced Data Possession Checking scheme using Identity Based Signature
    Thayaambika, M.
    Rajakumar, Solomon Sylvia
    Kalpana, V.
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 941 - 944
  • [37] Certificateless remote data integrity checking using lattices in cloud storage
    Sasikala, C.
    Bindu, C. Shoba
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (05): : 1513 - 1519
  • [38] Improving Cloud Security by Enhancing Remote Data Integrity Checking Algorithm
    Suganya, S.
    Vincent, P. M. Durai Raj
    [J]. 2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [39] Efficient Privacy-Preserving Remote Data Possession Checking Protocol for Critical Information Infrastructure
    Devi, Loganathan Yamuna
    Thilagavathy, Kaliannan
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2018, 24 (05) : 603 - 621
  • [40] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Yanyan Ji
    Bilin Shao
    Jinyong Chang
    Genqing Bian
    [J]. Cluster Computing, 2022, 25 : 337 - 349