Efficient integrity verification of replicated data in cloud using homomorphic encryption

被引:0
|
作者
Raghul Mukundan
Sanjay Madria
Mark Linderman
机构
[1] Missouri University of Science and Technology,Department of Computer Science
[2] Air Force Research Lab,undefined
来源
关键词
Replication; Data integrity; Cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
The cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services from a shared pool of configurable computing resources. However, since data owners and the cloud servers are not in the same trusted domain, the outsourced data may be at risk as the cloud server may no longer be fully trusted. Therefore, data confidentiality, availability and integrity is of critical importance in such a scenario. The data owner encrypts data before storing it on the cloud to ensure data confidentiality. Cloud should let the owners or a trusted third party to check for the integrity of their data storage without demanding a local copy of the data. Owners often replicate their data on the cloud servers across multiple data centers to provide a higher level of scalability, availability, and durability. When the data owners ask the cloud service provider (CSP) to replicate data, they are charged a higher storage fee by the CSP. Therefore, the data owners need to be strongly convinced that the CSP is storing data copies agreed on in the service level contract, and data-updates have been correctly executed on all the remotely stored copies. To deal with such problems, previous multi copy verification schemes either focused on static files or incurred huge update costs in a dynamic file scenario. In this paper, we propose a dynamic multi-replica provable data possession scheme (DMR-PDP) that while maintaining data confidentiality prevents the CSP from cheating, by maintaining fewer copies than paid for and/or tampering data. In addition, we also extend the scheme to support a basic file versioning system where only the difference between the original file and the updated file is propagated rather than the propagation of operations for privacy reasons. DMR-PDP also supports efficient dynamic operations like block modification, insertion and deletion on replicas over the cloud servers. Through security analysis and experimental results, we demonstrate that the proposed scheme is secure and performs better than some other related ideas published recently.
引用
收藏
页码:507 / 534
页数:27
相关论文
共 50 条
  • [41] Efficient memory integrity verification and encryption for secure processors
    Suh, GE
    Clarke, D
    Gassend, B
    van Dijk, M
    Devadas, S
    [J]. 36TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, 2003, : 339 - 350
  • [42] Secure data retrieval on the cloud homomorphic encryption meets coresets
    Akavia A.
    Feldman D.
    Shaul H.
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019, 2019 (02): : 80 - 106
  • [43] A Mixed Homomorphic Encryption Scheme for Secure Data Storage in Cloud
    Kangavalli, R.
    Vagdevi, S.
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 1062 - 1066
  • [44] Secure Data in Cloud Computing Using Fully Homomorphic Encryption and Public Key Infrastructure
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    [J]. VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 5950 - 5958
  • [45] Role-based access using partial homomorphic encryption for securing cloud data
    Urvashi Rahul Saxena
    Taj Alam
    [J]. International Journal of System Assurance Engineering and Management, 2023, 14 : 950 - 966
  • [46] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    [J]. INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 397 - 413
  • [47] Role-based access using partial homomorphic encryption for securing cloud data
    Saxena, Urvashi Rahul
    Alam, Taj
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023, 14 (03) : 950 - 966
  • [48] Quantum Fully Homomorphic Encryption with Verification
    Alagic, Gorjan
    Dulek, Yfke
    Schaffner, Christian
    Speelman, Florian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 438 - 467
  • [49] An Efficient Enhanced Full Homomorphic Encryption for Securing Video in Cloud Environment
    N. Geetha
    K. Mahesh
    [J]. Wireless Personal Communications, 2022, 123 : 1553 - 1571
  • [50] An Efficient Fully Homomorphic Encryption Scheme for Private Information Retrieval in the Cloud
    Wang, Xun
    Luo, Tao
    Li, Jianfeng
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2020, 34 (04)