A secure regenerating code-based cloud storage with efficient integrity verification

被引:5
|
作者
Lakshmi, V. S. [1 ]
Deepthi, P. P. [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Elect & Commun Engn, Calicut, Kerala, India
关键词
data confidentiality; data integrity; error correction; homomorphic encryption; regenerating codes; secure cloud storage; DISTRIBUTED STORAGE; ENCRYPTION; SIGNATURES;
D O I
10.1002/dac.3948
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud storage is gaining popularity as it relieves the data owners from the burden of data storage and maintenance cost. However, outsourcing data to third-party cloud servers raise several concerns such as data availability, confidentiality, and integrity. Recently, regenerating codes have gained popularity because of their low repair bandwidth while ensuring data availability. In this paper, we propose a secure regenerating code-based cloud storage (SRCCS) scheme, which utilizes the verifiable computation property of homomorphic encryption scheme to check the integrity of outsourced data. In this work, an error-correcting code (ECC)-based homomorphic encryption scheme (HES) is employed to simultaneously provide data privacy as well as error correction while supporting efficient integrity verification. In SRCCS, server regeneration process is initiated on detection of data corruption events in order to ensure data availability. The ECC-based HES significantly reduces the probability of server regeneration and minimizes the repair cost. Extensive theoretical analysis and simulation results validate the security, efficiency, and practicability of the proposed scheme.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] A data integrity verification service for cloud storage based on building blocks
    Reyes-Anastacio, Hugo G.
    Gonzalez-Compean, J. L.
    Morales-Sandoval, Miguel
    Carretero, Jesus
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2018, : 201 - 206
  • [42] DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
    Zhang, Xiaojun
    Zhao, Jie
    Xu, Chunxiang
    Wang, Huaxiong
    Zhang, Yuan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 334 - 345
  • [43] Query Integrity Verification based-on MAC Chain in Cloud Storage
    Hong, Jun
    Wen, Tao
    Gu, Quan
    Sheng, Gang
    2014 IEEE/ACIS 13TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2014, : 125 - 129
  • [44] Query integrity verification based-on MAC chain in cloud storage
    Hong J.
    Wen T.
    Guo Q.
    Sheng G.
    International Journal of Networked and Distributed Computing, 2014, 2 (4) : 241 - 249
  • [45] Query Integrity Verification based-on MAC Chain in Cloud Storage
    Hong, Jun
    Wen, Tao
    Guo, Quan
    Sheng, Gang
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2014, 2 (04) : 241 - 249
  • [46] DIVRS: Data integrity verification based on ring signature in cloud storage
    Tian, Miao
    Zhang, Yushu
    Zhu, Youwen
    Wang, Liangmin
    Xiang, Yong
    COMPUTERS & SECURITY, 2023, 124
  • [47] Cloud storage integrity verification audit scheme based on label classification
    Wang C.-B.
    Di X.-Q.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2021, 51 (04): : 1364 - 1369
  • [48] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
  • [49] A provably secure code-based concurrent signature scheme
    Asaar, Maryam Rajabzadeh
    Ameri, Mohammad Hassan
    Salmasizadeh, Mahmoud
    Aref, Mohammad Reza
    IET INFORMATION SECURITY, 2018, 12 (01) : 34 - 41
  • [50] Secure fuzzy identity-based public verification for cloud storage
    Xu, Yongliang
    Jin, Chunhua
    Qin, Wenyu
    Shan, Jinsong
    Jin, Ying
    Journal of Systems Architecture, 2022, 128