A hill cipher-based remote data possession checking in cloud storage

被引:4
|
作者
Chen, Lanxiang [1 ,2 ]
Guo, Gongde [1 ,2 ]
Peng, Zhen [1 ,2 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350108, Peoples R China
[2] Key Lab Network Secur & Cryptol, Fuzhou 350108, Peoples R China
关键词
PROOFS;
D O I
10.1002/sec.746
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage enables users to access their data at any time anywhere. It has the advantages of high scalability, ease of use, cost effectiveness, and so on. However, the server that stores users' data may not be fully trustworthy. When users store their data in cloud storage, they concern much about data intactness. This is the goal of remote data possession checking schemes. This paper proposes a Hill cipher-based remote data possession checking scheme. The main idea of the scheme comes from the homomorphism of Hill cipher, namely the tags computed from plaintext blocks can be used to compare with the tags computed from ciphertext blocks. It has several advantages as follows. First, it is efficient in terms of computation and communication. Second, it allows verification without the need for the challenger to compare against the original data. Third, the scheme only needs to store a small amount of metadata and use only small challenges and responses. Finally, it performs data possession checking at the same time it provides confidentiality of data. The security and performance analysis illustrates that the scheme is feasible and effective. © 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:511 / 518
页数:8
相关论文
共 50 条
  • [1] Data dynamics for remote data possession checking in cloud storage
    Chen, Lanxiang
    Zhou, Shuming
    Huang, Xinyi
    Xu, Li
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2413 - 2424
  • [2] On the Security of a Remote Data Possession Checking Scheme in Cloud Storage
    Liang, XinLong
    Jiang, Rui
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 96 - 99
  • [3] Remote data possession checking with enhanced security for cloud storage
    Yu, Yong
    Zhang, Yafang
    Ni, Jianbing
    Au, Man Ho
    Chen, Lanxiang
    Liu, Hongyu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 77 - 85
  • [4] An Improved Remote Data Possession Checking Protocol in Cloud Storage
    Zhou, Enguang
    Li, Zhoujun
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 611 - 617
  • [5] Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage
    Luo Yuchuan
    Fu Shaojing
    Xu Ming
    Wang Dongsheng
    [J]. CHINA COMMUNICATIONS, 2014, 11 (11) : 114 - 124
  • [6] A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Han, Jinguang
    Zhang, Yichen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 78 - 88
  • [7] A Remote File Possession Checking Protocol in a Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 115 - 121
  • [8] Improved security of a dynamic remote data possession checking protocol for cloud storage
    Yu, Yong
    Ni, Jianbing
    Au, Man Ho
    Liu, Hongyu
    Wang, Hua
    Xu, Chunxiang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (17) : 7789 - 7796
  • [9] Remote data possession checking with privacy-preserving authenticators for cloud storage
    Shen, Wenting
    Yang, Guangyang
    Yu, Jia
    Zhang, Hanlin
    Kong, Fanyu
    Hao, Rong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 136 - 145
  • [10] Hierarchical remote data possession checking method based on massive cloud files
    Haifeng M.
    Zhenguo G.
    Nianmin Y.
    [J]. Haifeng, Ma (mhf_2000@163.com), 1600, SAGE Publications Inc. (11): : 126 - 134