A secure regenerating code-based cloud storage with efficient integrity verification

被引:5
|
作者
Lakshmi, V. S. [1 ]
Deepthi, P. P. [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Elect & Commun Engn, Calicut, Kerala, India
关键词
data confidentiality; data integrity; error correction; homomorphic encryption; regenerating codes; secure cloud storage; DISTRIBUTED STORAGE; ENCRYPTION; SIGNATURES;
D O I
10.1002/dac.3948
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud storage is gaining popularity as it relieves the data owners from the burden of data storage and maintenance cost. However, outsourcing data to third-party cloud servers raise several concerns such as data availability, confidentiality, and integrity. Recently, regenerating codes have gained popularity because of their low repair bandwidth while ensuring data availability. In this paper, we propose a secure regenerating code-based cloud storage (SRCCS) scheme, which utilizes the verifiable computation property of homomorphic encryption scheme to check the integrity of outsourced data. In this work, an error-correcting code (ECC)-based homomorphic encryption scheme (HES) is employed to simultaneously provide data privacy as well as error correction while supporting efficient integrity verification. In SRCCS, server regeneration process is initiated on detection of data corruption events in order to ensure data availability. The ECC-based HES significantly reduces the probability of server regeneration and minimizes the repair cost. Extensive theoretical analysis and simulation results validate the security, efficiency, and practicability of the proposed scheme.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Code-based Provable Data Possession Scheme for Integrity Verification in Cloud Storage
    Ye, Junyao
    Wang, Yanhong
    Liu, Kening
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 207 - 212
  • [2] A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
    Lin, Hsiao-Ying
    Tzeng, Wen-Guey
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 995 - 1003
  • [3] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [4] An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems
    Shen, Shiuan-Tzuo
    Lin, Hsiao-Ying
    Tzeng, Wen-Guey
    IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (03) : 840 - 851
  • [5] Public Integrity Auditing for Dynamic Regenerating Code Based Cloud Storage
    He, Kai
    Huang, Chuanhe
    Shi, Jiaoli
    Wang, Jinhai
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 581 - 588
  • [6] A Secure and Efficient Code-Based Signature Scheme
    Liu, Xiangxin
    Yang, Xiaoyuan
    Han, Yiliang
    Wang, Xu An
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 635 - 645
  • [7] On Efficient and Secure Code-based Masking: A Pragmatic Evaluation
    Wu Q.
    Cheng W.
    Guilley S.
    Zhang F.
    Fu W.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (03): : 192 - 222
  • [8] Public data integrity verification scheme for secure cloud storage
    Ping Y.
    Zhan Y.
    Lu K.
    Wang B.
    Ping, Yuan (pyuan.lhn@xcu.edu.cn); Wang, Baocang (bcwang79@aliyun.com), 1600, MDPI AG (11):
  • [9] Public Data Integrity Verification Scheme for Secure Cloud Storage
    Ping, Yuan
    Zhan, Yu
    Lu, Ke
    Wang, Baocang
    INFORMATION, 2020, 11 (09)
  • [10] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,