Improved Fair and Dynamic Provable Data Possession Supporting Public Verification

被引:2
|
作者
REN Zhengwei [1 ,2 ]
WANG Lina [1 ,2 ]
DENG Ruyi [1 ,2 ]
YU Rongwei [1 ,2 ]
机构
[1] Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education
[2] School of Computer, Wuhan University
关键词
cloud storage; data integrity; public audit; data dynamics; privacy protection;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
A number of proposals have been suggested to tackle data integrity and privacy concerns in cloud storage in which some existing schemes suffer from vulnerabilities in data dynamics. In this paper, we propose an improved fairness and dynamic provable data possession scheme that supports public verification and batch auditing while preserves data privacy. The rb23Tree is utilized to facilitate data dynamics. Moreover, the fairness is considered to prevent a dishonest user from accusing the cloud service provider of manipulating the data. The scheme allows a third party auditor (TPA) to verify the data integrity without learning any information about the data content during the auditing process. Furthermore, our scheme also allows batch auditing, which greatly accelerates the auditing process when there are multiple auditing requests. Security analysis and extensive experimental evaluations show that our scheme is secure and efficient.
引用
收藏
页码:348 / 354
页数:7
相关论文
共 50 条
  • [1] AN IMPROVED DYNAMIC PROVABLE DATA POSSESSION MODEL
    Liu, Feifei
    Gu, Dawu
    Lu, Haining
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 290 - 295
  • [2] Provable data possession scheme based on public verification and private verification
    Tian J.
    Chai M.
    Qi L.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (03): : 48 - 59
  • [3] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [4] Dynamic Provable Data Possession
    Erway, C. Chris
    Kuepcue, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 213 - 222
  • [5] Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
    Gritti, Clementine
    Chen, Rongmao
    Susilo, Willy
    Plantard, Thomas
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 485 - 505
  • [6] Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy
    Gritti, Clementine
    Susilo, Willy
    Plantard, Thomas
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 395 - 412
  • [7] Multi-replica provable data possession scheme supporting data dynamic updating
    Chen, Long
    Luo, Yu-Zhu
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 14 - 19
  • [8] Fair Provable Data Possession Scheme Based on Blockchain
    Tang F.
    Feng Z.
    Huang Y.-H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (02): : 406 - 415
  • [9] Proxy Provable Data Possession in Public Clouds
    Wang, Huaqun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (04) : 551 - 559
  • [10] Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage
    Liu, Yudong
    Wang, Xu An
    Cao, Yunfei
    Tang, Dianhua
    Yang, Xiaoyuan
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 445 - 452