Mutual Verifiable Provable Data Auditing in Public Cloud Storage

被引:358
|
作者
Ren, Yongjun [1 ,2 ]
Shen, Jian [1 ,2 ]
Wang, Jin [1 ,2 ]
Han, Jin [1 ,2 ]
Lee, Sungyoung [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2015年 / 16卷 / 02期
基金
新加坡国家研究基金会;
关键词
Cloud computing; Data storage auditing; Provable data possession; Key agreement; ENERGY-EFFICIENT;
D O I
10.6138/JIT.2015.16.2.20140918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is now a hot research topic in information technology. In cloud storage, date security properties such as data confidentiality, integrity and availability become more and more important in many commercial applications. Recently, many provable data possession (PDP) schemes are proposed to protect data integrity. In some cases, it has to delegate the remote data possession checking task to some proxy. However, these PDP schemes are not secure since the proxy stores some state information in cloud storage servers. Hence, in this paper, we propose an efficient mutual verifiable provable data possession scheme, which utilizes Diffie-Hellman shared key to construct the homomorphic authenticator. In particular, the verifier in our scheme is stateless and independent of the cloud storage service. It is worth noting that the presented scheme is very efficient compared with the previous PDP schemes, since the bilinear operation is not required.
引用
下载
收藏
页码:317 / 323
页数:7
相关论文
共 50 条
  • [21] Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 795 - 798
  • [22] Provable data transfer from provable data possession and deletion in cloud storage
    Xue, Liang
    Ni, Jianbing
    Li, Yannan
    Shen, Jian
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 46 - 54
  • [23] Public Auditing for Shared Data in Cloud Storage with an Effective User Dismissal
    Samundiswary, S.
    Dongre, Nilima
    COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018, 2019, 810 : 97 - 104
  • [24] Secure public data auditing scheme for cloud storage in smart city
    Wu, Libing
    Wang, Jing
    Kumar, Neeraj
    He, Debiao
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 949 - 962
  • [25] Data error locations reported by public auditing in cloud storage service
    Hwang, Min-Shiang
    Lee, Cheng-Chi
    Sun, Tsuei-Hung
    AUTOMATED SOFTWARE ENGINEERING, 2014, 21 (03) : 373 - 390
  • [26] Blockchain-based public auditing for big data in cloud storage
    Li, Jiaxing
    Wu, Jigang
    Jiang, Guiyuan
    Srikanthan, Thambipillai
    INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (06)
  • [27] Data error locations reported by public auditing in cloud storage service
    Min-Shiang Hwang
    Cheng-Chi Lee
    Tsuei-Hung Sun
    Automated Software Engineering, 2014, 21 : 373 - 390
  • [28] Self-certified Public Auditing for Data Integrity in Cloud Storage
    Zhang, Jianhong
    Zeng, Weina
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 267 - 273
  • [29] Secure public data auditing scheme for cloud storage in smart city
    Libing Wu
    Jing Wang
    Neeraj Kumar
    Debiao He
    Personal and Ubiquitous Computing, 2017, 21 : 949 - 962
  • [30] A Survey on Provable Data Possession in Cloud Storage
    Thangavel, M.
    Varalakshmi, P.
    Sindhuja, R.
    Sridhar, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 25 - 31