An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems

被引:22
|
作者
Shen, Shiuan-Tzuo [1 ]
Lin, Hsiao-Ying [2 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
[2] Natl Chiao Tung Univ, Intelligent Informat & Commun Res Ctr, Hsinchu 30010, Taiwan
关键词
Data confidentiality; data robustness; homomorphism; integrity check; secure decentralized erasure code; PROVABLE DATA POSSESSION;
D O I
10.1109/TR.2015.2423192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the application of cloud storage, a user no longer possesses his files in his local depository. Thus, he is concerned about the security of the stored files. Data confidentiality and data robustness are the main security issues. For data confidentiality, the user can first encrypt files and then store the encrypted files in a cloud storage. For data robustness, there are two concerns: service failure, and service corruption. We are concerned about data robustness in cloud storage services. Lin and Tzeng proposed a secure erasure code-based storage system with multiple key servers recently. Their system supports a repair mechanism, where a new storage server can compute a new ciphertext from the ciphertexts obtained from the remaining storage servers. Their system considers data confidentiality in the cloud, and data robustness against storage server failure. In this paper, we propose an integrity check scheme for their system to enhance data robustness against storage server corruption, which returns tampered ciphertexts. With our integrity check scheme, their storage system can deal with not only the problem of storage server failure, but also the problem of storage server corruption. The challenging part of our work is to have homomorphic integrity tags. New integrity tags can be computed from old integrity tags by storage servers without involvement of the user's secret key or backup servers. We prove the security of our integrity check scheme formally, and establish the parameters for achieving an overwhelming probability of a successful data retrieval.
引用
收藏
页码:840 / 851
页数:12
相关论文
共 50 条
  • [31] Modelling Multi Level Consistency in Erasure Code Based Storage Systems
    Lee, Ojus Thomas
    Sharma, Vijay
    Kumar, S. D. Madhu
    Chandran, Priya
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 122 - 129
  • [32] An Erasure Code-based Approach to Improve Data Recovery and Update Capability
    Zhou, Hang
    Yang, Yahui
    Li, Weiping
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC, CONTROL AND AUTOMATION ENGINEERING (MECAE 2018), 2018, 149 : 614 - 622
  • [33] A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks
    Lakshmi, V. S.
    Deepthi, P. P.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (01)
  • [34] Cellular automata based secure distributed storage scheme with integrity proof
    Zhou, Yousheng
    Wang, Feng
    Tang, Fei
    Wang, Xiaojun
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 291 - 304
  • [35] On Efficient and Secure Code-based Masking: A Pragmatic Evaluation
    Wu Q.
    Cheng W.
    Guilley S.
    Zhang F.
    Fu W.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (03): : 192 - 222
  • [36] A New Code-Based Blind Signature Scheme
    Chen, Siyuan
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    COMPUTER JOURNAL, 2022, 65 (07): : 1776 - 1786
  • [37] Provably Secure Code-Based Threshold Ring Signatures
    Dallot, Leonard
    Vergnaud, Damien
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2009, 5921 : 222 - +
  • [38] SpreadStore: A LDPC Erasure Code scheme for Distributed Storage System
    Harihara, S. G.
    Janakiram, Balaji
    Chandra, M. Girish
    Aravind, K. G.
    Kadhe, Swanand
    Balamuralidhar, P.
    Adiga, B. S.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA STORAGE AND DATA ENGINEERING (DSDE 2010), 2010, : 154 - 158
  • [39] Design of File Multi-Cloud Secure Storage System Based on Web and Erasure Code
    Shi, Wei
    Liu, Tenglong
    Huang, Min
    PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020), 2020, : 208 - 211
  • [40] Blockchain Storage Optimization Based on Erasure Code
    Fan Y.-Q.
    Sheng D.
    Wang L.-F.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (04): : 858 - 876