An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems

被引:22
|
作者
Shen, Shiuan-Tzuo [1 ]
Lin, Hsiao-Ying [2 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
[2] Natl Chiao Tung Univ, Intelligent Informat & Commun Res Ctr, Hsinchu 30010, Taiwan
关键词
Data confidentiality; data robustness; homomorphism; integrity check; secure decentralized erasure code; PROVABLE DATA POSSESSION;
D O I
10.1109/TR.2015.2423192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the application of cloud storage, a user no longer possesses his files in his local depository. Thus, he is concerned about the security of the stored files. Data confidentiality and data robustness are the main security issues. For data confidentiality, the user can first encrypt files and then store the encrypted files in a cloud storage. For data robustness, there are two concerns: service failure, and service corruption. We are concerned about data robustness in cloud storage services. Lin and Tzeng proposed a secure erasure code-based storage system with multiple key servers recently. Their system supports a repair mechanism, where a new storage server can compute a new ciphertext from the ciphertexts obtained from the remaining storage servers. Their system considers data confidentiality in the cloud, and data robustness against storage server failure. In this paper, we propose an integrity check scheme for their system to enhance data robustness against storage server corruption, which returns tampered ciphertexts. With our integrity check scheme, their storage system can deal with not only the problem of storage server failure, but also the problem of storage server corruption. The challenging part of our work is to have homomorphic integrity tags. New integrity tags can be computed from old integrity tags by storage servers without involvement of the user's secret key or backup servers. We prove the security of our integrity check scheme formally, and establish the parameters for achieving an overwhelming probability of a successful data retrieval.
引用
收藏
页码:840 / 851
页数:12
相关论文
共 50 条
  • [1] A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
    Lin, Hsiao-Ying
    Tzeng, Wen-Guey
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 995 - 1003
  • [2] Storage Node Allocation Methods for Erasure Code-based Cloud Storage Systems
    Lee, Ojus Thomas
    Akash, G. J.
    Kumar, S. D. Madhu
    Chandran, Priya
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2019, 44 (11) : 9127 - 9142
  • [3] A secure regenerating code-based cloud storage with efficient integrity verification
    Lakshmi, V. S.
    Deepthi, P. P.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (09)
  • [4] Storage Node Allocation Methods for Erasure Code-based Cloud Storage Systems
    Ojus Thomas Lee
    G. J. Akash
    S. D. Madhu Kumar
    Priya Chandran
    Arabian Journal for Science and Engineering, 2019, 44 : 9127 - 9142
  • [5] Erasure code-based low storage blockchain node
    Perard, Doriane
    Lacan, Jerome
    Bachy, Yann
    Detchart, Jonathan
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1622 - 1627
  • [6] A Secure and Efficient Code-Based Signature Scheme
    Liu, Xiangxin
    Yang, Xiaoyuan
    Han, Yiliang
    Wang, Xu An
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 635 - 645
  • [7] Code-based Provable Data Possession Scheme for Integrity Verification in Cloud Storage
    Ye, Junyao
    Wang, Yanhong
    Liu, Kening
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 207 - 212
  • [8] An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage
    Wang, Wenfeng
    Li, Peiwu
    Han, Longzhe
    Huang, Shuqiang
    Xu, Kefu
    Yu, Changgui
    Lei, Jin'e
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [9] A provably secure code-based concurrent signature scheme
    Asaar, Maryam Rajabzadeh
    Ameri, Mohammad Hassan
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    IET INFORMATION SECURITY, 2018, 12 (01) : 34 - 41
  • [10] A Provably Secure Group Signature Scheme from Code-Based Assumptions
    Ezerman, Martianus Frederic
    Lee, Hyung Tae
    Ling, San
    Khoa Nguyen
    Wang, Huaxiong
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 260 - 285