A hill cipher-based remote data possession checking in cloud storage

被引:4
|
作者
Chen, Lanxiang [1 ,2 ]
Guo, Gongde [1 ,2 ]
Peng, Zhen [1 ,2 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350108, Peoples R China
[2] Key Lab Network Secur & Cryptol, Fuzhou 350108, Peoples R China
关键词
PROOFS;
D O I
10.1002/sec.746
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage enables users to access their data at any time anywhere. It has the advantages of high scalability, ease of use, cost effectiveness, and so on. However, the server that stores users' data may not be fully trustworthy. When users store their data in cloud storage, they concern much about data intactness. This is the goal of remote data possession checking schemes. This paper proposes a Hill cipher-based remote data possession checking scheme. The main idea of the scheme comes from the homomorphism of Hill cipher, namely the tags computed from plaintext blocks can be used to compare with the tags computed from ciphertext blocks. It has several advantages as follows. First, it is efficient in terms of computation and communication. Second, it allows verification without the need for the challenger to compare against the original data. Third, the scheme only needs to store a small amount of metadata and use only small challenges and responses. Finally, it performs data possession checking at the same time it provides confidentiality of data. The security and performance analysis illustrates that the scheme is feasible and effective. © 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:511 / 518
页数:8
相关论文
共 50 条
  • [31] A Wew Remote Data Integrity Checking Scheme for Cloud storage With Privacy Preserving
    Yan, Xiangtao
    Li, Yifa
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 704 - 708
  • [32] Cryptanalysis of "Certificateless remote data integrity checking using lattices in cloud storage"
    Lan, Caihui
    Li, Haifeng
    Wang, Caifen
    2020 10TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2020, : 134 - 138
  • [33] A Survey on Provable Data Possession in Cloud Storage
    Thangavel, M.
    Varalakshmi, P.
    Sindhuja, R.
    Sridhar, S.
    2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 25 - 31
  • [34] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Yanyan Ji
    Bilin Shao
    Jinyong Chang
    Genqing Bian
    Cluster Computing, 2022, 25 : 337 - 349
  • [35] Efficient data possession-checking protocol with deduplication in cloud
    Wei, Jinxia
    Niu, Xinxin
    Zhang, Ru
    Liu, Jianyi
    Yao, Yuangang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08): : 1 - 13
  • [36] Efficient remote data possession checking in critical information infrastructures
    Sebe, Francesc
    Domingo-Ferrer, Josep
    Martinez-Balleste, Antoni
    Deswarte, Yves
    Quisquater, Jean-Jacques
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (08) : 1034 - 1038
  • [37] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 337 - 349
  • [38] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    Cluster Computing, 2022, 25 (01): : 337 - 349
  • [39] An Efficient Provable Data Possession based on Elliptic Curves in Cloud Storage
    Wang, Hongyuan
    Zhu, Liehuang
    Wang, Feng
    Lilong, Yijia
    Chen, Yu
    Liu, Chang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 97 - 108
  • [40] Attribute-based Data Integrity Checking for Cloud Storage
    Tian, Miaomiao
    Wang, Lingyan
    Zhong, Hong
    Chen, Jie
    FUNDAMENTA INFORMATICAE, 2018, 163 (04) : 395 - 411