Efficient integrity verification of replicated data in cloud using homomorphic encryption

被引:0
|
作者
Raghul Mukundan
Sanjay Madria
Mark Linderman
机构
[1] Missouri University of Science and Technology,Department of Computer Science
[2] Air Force Research Lab,undefined
来源
关键词
Replication; Data integrity; Cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
The cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services from a shared pool of configurable computing resources. However, since data owners and the cloud servers are not in the same trusted domain, the outsourced data may be at risk as the cloud server may no longer be fully trusted. Therefore, data confidentiality, availability and integrity is of critical importance in such a scenario. The data owner encrypts data before storing it on the cloud to ensure data confidentiality. Cloud should let the owners or a trusted third party to check for the integrity of their data storage without demanding a local copy of the data. Owners often replicate their data on the cloud servers across multiple data centers to provide a higher level of scalability, availability, and durability. When the data owners ask the cloud service provider (CSP) to replicate data, they are charged a higher storage fee by the CSP. Therefore, the data owners need to be strongly convinced that the CSP is storing data copies agreed on in the service level contract, and data-updates have been correctly executed on all the remotely stored copies. To deal with such problems, previous multi copy verification schemes either focused on static files or incurred huge update costs in a dynamic file scenario. In this paper, we propose a dynamic multi-replica provable data possession scheme (DMR-PDP) that while maintaining data confidentiality prevents the CSP from cheating, by maintaining fewer copies than paid for and/or tampering data. In addition, we also extend the scheme to support a basic file versioning system where only the difference between the original file and the updated file is propagated rather than the propagation of operations for privacy reasons. DMR-PDP also supports efficient dynamic operations like block modification, insertion and deletion on replicas over the cloud servers. Through security analysis and experimental results, we demonstrate that the proposed scheme is secure and performs better than some other related ideas published recently.
引用
收藏
页码:507 / 534
页数:27
相关论文
共 50 条
  • [1] Efficient integrity verification of replicated data in cloud using homomorphic encryption
    Mukundan, Raghul
    Madria, Sanjay
    Linderman, Mark
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2014, 32 (04) : 507 - 534
  • [2] Efficient integrity verification of replicated data in cloud computing system
    Yi, Mingxu
    Wei, Jinxia
    Song, Lingwei
    [J]. COMPUTERS & SECURITY, 2017, 65 : 202 - 212
  • [3] Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
    Liu, Ruoshui
    Liu, Jianghui
    Zhang, Jingjie
    Zhang, Moli
    [J]. INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2018, 2018
  • [4] A Protected Cloud Computation Algorithm Using Homomorphic Encryption for Preserving Data Integrity
    Awasthi, Prakhar
    Mittal, Sanya
    Mukherjee, Sibeli
    Limbasiya, Trupil
    [J]. RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 509 - 517
  • [5] Efficient Verification of Data Encryption on Cloud Servers
    Hu, Keji
    Zhang, Wensheng
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 314 - 321
  • [6] Secure Data Mining in Cloud using Homomorphic Encryption
    Mittal, Deepti
    Kaur, Damandeep
    Aggarwal, Ashish
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 155 - 160
  • [7] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Soufiene Ben Othman
    Abdullah Ali Bahattab
    Abdelbasset Trad
    Habib Youssef
    [J]. Wireless Personal Communications, 2015, 80 : 867 - 889
  • [8] Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
    Ben Othman, Soufiene
    Bahattab, Abdullah Ali
    Trad, Abdelbasset
    Youssef, Habib
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) : 867 - 889
  • [9] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [10] Integrity as a service for replicated data on the cloud
    Abo-alian, Alshaimaa
    Badr, Nagwa L.
    Tolba, M. F.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (04):