Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

被引:1
|
作者
Xu, Guangwei [1 ]
Li, Shan [1 ]
Lai, Miaolin [1 ]
Gan, Yanglan [1 ]
Feng, Xiangyang [1 ]
Huang, Qiubo [1 ]
Li, Li [2 ]
Li, Wei [1 ]
机构
[1] Donghua Univ, Sch Comp Sci & Technol, Shanghai 201620, Peoples R China
[2] Tongji Univ, Coll Architecture & Urban Planning, Shanghai 200092, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Cloud Storage; Data Sharing; Data Integrity Verification; Multiple Verifiers; Verification Control;
D O I
10.3837/tiis.2022.02.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.
引用
收藏
页码:565 / 586
页数:22
相关论文
共 50 条
  • [1] Public integrity verification for data sharing in cloud with asynchronous revocation
    Song, Wei
    Wu, Yu
    Cui, Yihui
    Liu, Qilie
    Shen, Yuan
    Qiu, Zicheng
    Yao, Jianjun
    Peng, Zhiyong
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (01) : 33 - 43
  • [2] Public integrity verification for data sharing in cloud with asynchronous revocation
    Wei Song
    Yu Wu
    Yihui Cui
    Qilie Liu
    Yuan Shen
    Zicheng Qiu
    Jianjun Yao
    Zhiyong Peng
    [J]. Digital Communications and Networks., 2022, 8 (01) - 43
  • [3] A Survey of Remote Data Integrity Checking: Techniques and Verification Structures
    Chen, Yu
    Wang, Feng
    Zhu, Liehuang
    Zhang, Zijian
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (04): : 179 - 198
  • [4] Integrity verification for XML data
    Baweu, Jules R. Nya
    Guo, Huiping
    [J]. WCECS 2007: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2007, : 633 - 638
  • [5] Cloud Data Integrity Verification Algorithm Based on Data Mining and Accounting Informatization
    Wang, Junli
    Yang, Xiqian
    Li, Zhi
    [J]. SCIENTIFIC PROGRAMMING, 2022, 2022
  • [7] Partitioning-Based Data Sharing Approach for Data Integrity Verification in Distributed Fog Computing
    Kaliyaperumal, Uma Maheswari
    Somasundaram, Mary Saira Bhanu
    Savarimuthu, Nickolas
    [J]. INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY INNOVATION, 2023, 13 (02) : 160 - 174
  • [8] An Efficient and Robust Data Integrity Verification Algorithm Based on Context Sensitive
    Xie, Feng
    Chen, Hu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 33 - 40
  • [9] Blockchain assisted blind signature algorithm with data integrity verification scheme
    Shrivastava, Pranav
    Alam, Bashir
    Alam, Mansaf
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (13):
  • [10] Accountable data trading scheme supporting data integrity verification
    Chen, Lisha
    Li, Xuelian
    Gao, Juntao
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (04): : 1364 - 1371