An alternative approach to public cloud data auditing supporting data dynamics

被引:1
|
作者
Tao Wang
Bo Yang
Hongyu Liu
Yong Yu
Guoyong Qiu
Zhe Xia
机构
[1] Shaanxi Normal University,School of Computer Science
[2] Chinese Academy of Sciences,State Key Laboratory of Information Security, Institute of Information Engineering
[3] Ministry of Education,Key Laboratory of Modern Teaching Technology
[4] University of Electronic Science and Technology of China,School of Computer Science and Engineering
[5] Wuhan University of Technology,School of Computer Science and Technology
来源
Soft Computing | 2019年 / 23卷
关键词
Provable data possession; Cloud data auditing; Verifiable data outsourcing; Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
Public cloud data auditing allows a user to delegate an auditing job to a third party who is responsible for verifying whether a cloud server has faithfully stored a file or not. Proof of retrievability (PoR) is a widely used protocol for this kind of job. To the best of our knowledge, in the publicly verifiable setting with supporting data dynamics, all known PoR schemes are either rely on the random oracles or are built in the standard model but require nonstandard assumptions. In this paper, we present a scheme which explores the linear homomorphic signature and the sequence Merkle hash tree to construct the homomorphic linear authenticator for the PoR. The security of our proposed scheme can be proved in the standard model, assuming the hash function is collision resilient and the computational Diffie–Hellman assumption holds. The scheme also supports data modification, data insertion and data deletion. Furthermore, our technique can also be regarded as a novel paradigm by combining the homomorphic signature and authenticated data structure (with certain properties) to construct the homomorphic linear authenticator for the PoR protocols.
引用
收藏
页码:4939 / 4953
页数:14
相关论文
共 50 条
  • [31] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [32] Division and Replication for data with public auditing scheme for cloud storage
    Salunkhe, Sujata D.
    Patil, Dhanshri
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [33] NaEPASC: a novel and efficient public auditing scheme for cloud data
    Shuang Tan
    Yan Jia
    Journal of Zhejiang University SCIENCE C, 2014, 15 : 794 - 804
  • [34] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [35] NaEPASC: a novel and efficient public auditing scheme for cloud data
    Tan, Shuang
    Jia, Yan
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2014, 15 (09): : 794 - 804
  • [36] A survey of public auditing for secure data storage in cloud computing
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [37] Mutual Verifiable Provable Data Auditing in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Han, Jin
    Lee, Sungyoung
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (02): : 317 - 323
  • [38] NaEPASC:a novel and efficient public auditing scheme for cloud data
    Shuang TAN
    Yan JIA
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2014, 15 (09) : 794 - 804
  • [39] Comments on a Public Auditing Mechanism for Shared Cloud Data Service
    Yu, Yong
    Ni, Jianbing
    Man Ho Au
    Mu, Yi
    Wang, Boyang
    Li, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (06) : 998 - 999
  • [40] Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2904 - 2912