Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing

被引:16
|
作者
Shen, Jian [1 ,2 ]
Liu, Dengzhi [3 ]
He, Debiao [4 ,5 ]
Huang, Xinyi [6 ]
Xiang, Yang [7 ,8 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing 210044, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Peoples R China
[4] Wuhan Univ, Comp Sch, State Key Lab Software Engn, Wuhan 430072, Peoples R China
[5] State Key Lab Cryptol, Beijing 100878, Peoples R China
[6] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350007, Fujian, Peoples R China
[7] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[8] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
来源
基金
美国国家科学基金会;
关键词
CSPs; algebraic signature-based; data integrity auditing; batch auditing; data dynamics; DATA POSSESSION CHECKING; SERVICES; STORAGE; SECURE;
D O I
10.1109/TSUSC.2017.2781232
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud services, the resources-constrained enterprises and individuals can outsource the huge sensitive data into the Cloud Service Providers (CSPs) who fully control the data physically. Since CSPs are not fully trusted, it is essential to protect the integrity and confidentiality of users' data. Plenty of researchers have devoted considerable attention to solve this issue in the last decade such as various PDP and POR schemes. In this paper, we propose an algebraic signature-based data integrity auditing scheme that ensures the cloud data integrity and confidentiality with batch auditing. Moreover, one advantage of the scheme is that it can also support data dynamics by using only one cloud server. The security analysis shows that our construction can achieve the desired security properties. We also provide the simulation results of the dynamic operations on different numbers of data blocks and sub-blocks, which show that our scheme is efficient for real-world applications.
引用
收藏
页码:161 / 173
页数:13
相关论文
共 50 条
  • [1] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316
  • [2] Provable Cloud Data Transfer with Efficient Integrity Auditing for Cloud Computing
    Yang, Changsong
    Xiao, Jun
    Liu, Yueling
    Liu, Yang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [3] Public Integrity Auditing for Shared Data with Efficient and Secure User Revocation in Cloud Computing
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 588 - 593
  • [4] A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing
    Hiremath, Shivarajkumar
    Kunte, Sanjeev
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 306 - 310
  • [5] Decentralized Integrity Auditing Scheme for Cloud Data Based on Blockchain and Edge Computing
    Yang, Xiaodong
    Wang, Xiuxiu
    Li, Xixi
    Zhou, Hang
    Wang, Caifen
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (10): : 3759 - 3766
  • [6] Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing
    Ramaiah, Y. Govinda
    Kumari, G. Vijaya
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1559 - 1566
  • [7] A Survey on Data Auditing Approaches to Preserve Privacy and Data Integrity in Cloud Computing
    Kavya, V
    Sumathi, R.
    Shwetha, A. N.
    [J]. SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 108 - 118
  • [8] Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud
    El Ghazouani, Mohamed
    El Kiram, My Ahmed
    Er-Rajy, Latifa
    El Khanboubi, Yassine
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2020, 6 (03): : 32 - 38
  • [9] Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing
    Abbdal, Salah H.
    Jin, Hai
    Zou, Deqing
    Yassin, Ali A.
    [J]. 2014 7TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2014, : 3 - 6
  • [10] Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing
    Singh, Anirudha Pratap
    Pasupuleti, Syam Kumar
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 751 - 759