Provable Data Possession Supporting Secure Data Transfer for Cloud Storage

被引:14
|
作者
Yu, Yong [1 ,2 ]
Ni, Jianbing [1 ]
Yu, Yong [1 ,2 ]
Wu, Wei [2 ]
Wang, Yilei [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
关键词
Cloud computing; Data integrity; Data Transfer;
D O I
10.1109/BWCCA.2015.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the appealing advantages of cloud storage, such as on-demand self-service and ubiquitous network access, an increasing number of users prefer to store their data on remote remote servers. However, outsourced data transfer becomes a critical requirement for users to shift their cloud storage providers because of the emergence of various cloud storage services with different qualities of services. Therefore, the users may not only be anxious about the state of their data on the cloud server, but also concern on whether the data are transferred entirely to the new cloud without corruption and whether the data on original cloud are discarded. To address these problems, we propose a provable data possession scheme for cloud storage services characterized by secure data transfer, provable data erasure, high error detection probability, confidential data storage. Our scheme can guarantee the remote data integrity when the data are maintaining on the cloud servers and are transferring between two clouds, and secure deletion of transferred data on the original cloud.
引用
收藏
页码:38 / 42
页数:5
相关论文
共 50 条
  • [31] Designated-Verifier Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Kim, Jeong-Uk
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 11 - 19
  • [32] Secure provable data possession scheme with replication support in the cloud using Tweaks
    S. Ahamed Ali
    M. Ramakrishnan
    Cluster Computing, 2019, 22 : 1113 - 1123
  • [33] Secure provable data possession scheme with replication support in the cloud using Tweaks
    Ali, S. Ahamed
    Ramakrishnan, M.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1113 - 1123
  • [34] Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Wang, Bo
    Wang, Tao
    Feng, Shuai
    Li, Siwei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3986 - 3998
  • [35] Provable multiple-replica dynamic data possession for big data storage in cloud computing
    Hou, Huiying
    Yu, Jia
    Hao, Rong
    International Journal of Network Security, 2018, 20 (03) : 575 - 584
  • [36] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 : 31 - 43
  • [37] Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 795 - 798
  • [38] Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System
    Yuan, Yilin
    Zhang, Jianbiao
    Xu, Wanshan
    IEEE ACCESS, 2020, 8 : 120778 - 120784
  • [39] Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation
    Chaudhari, Smita
    Swain, Gandharba
    IEEE ACCESS, 2022, 10 : 31607 - 31625