A hill cipher-based remote data possession checking in cloud storage

被引:4
|
作者
Chen, Lanxiang [1 ,2 ]
Guo, Gongde [1 ,2 ]
Peng, Zhen [1 ,2 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350108, Peoples R China
[2] Key Lab Network Secur & Cryptol, Fuzhou 350108, Peoples R China
关键词
PROOFS;
D O I
10.1002/sec.746
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage enables users to access their data at any time anywhere. It has the advantages of high scalability, ease of use, cost effectiveness, and so on. However, the server that stores users' data may not be fully trustworthy. When users store their data in cloud storage, they concern much about data intactness. This is the goal of remote data possession checking schemes. This paper proposes a Hill cipher-based remote data possession checking scheme. The main idea of the scheme comes from the homomorphism of Hill cipher, namely the tags computed from plaintext blocks can be used to compare with the tags computed from ciphertext blocks. It has several advantages as follows. First, it is efficient in terms of computation and communication. Second, it allows verification without the need for the challenger to compare against the original data. Third, the scheme only needs to store a small amount of metadata and use only small challenges and responses. Finally, it performs data possession checking at the same time it provides confidentiality of data. The security and performance analysis illustrates that the scheme is feasible and effective. © 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:511 / 518
页数:8
相关论文
共 50 条
  • [21] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [22] Identity-based remote data possession checking in public clouds
    Wang, Huaqun
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    [J]. IET INFORMATION SECURITY, 2014, 8 (02) : 114 - 121
  • [23] A Novel Cipher-Based Data Encryption with Galois Field Theory
    Hazzazi, Mohammad Mazyad
    Attuluri, Sasidhar
    Bassfar, Zaid
    Joshi, Kireet
    [J]. SENSORS, 2023, 23 (06)
  • [24] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [25] Certificateless remote data integrity checking using lattices in cloud storage
    Sasikala, C.
    Bindu, C. Shoba
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (05): : 1513 - 1519
  • [26] Multiple Replica based Remote Data Possession Checking Scheme based on Matrix Representation of Data
    Balamurugan, B.
    Mandadi, Akhil Reddy
    Mohan, Sabana
    Faahtheima, Sherein
    [J]. INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [27] Efficient Dynamic Data Possession Checking in Cloud Computing
    Jiao, Wenzhe
    Wang, Guoqing
    Ye, Xiaoxue
    Zhai, Zhengjun
    [J]. ADVANCES IN APPLIED SCIENCE, ENGINEERING AND TECHNOLOGY, 2013, 709 : 603 - 610
  • [28] Attributed based Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Yang, Zhenqi
    Wang, Jin
    Fang, Liming
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 710 - 713
  • [29] Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
    Yuan, Yilin
    Zhang, Zhenzhen
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01)
  • [30] Remote data possession checking scheme with supporting efficient group user authority management for shared cloud data
    Yilin Yuan
    Zhenzhen Zhang
    [J]. Scientific Reports, 13