A secure remote data integrity checking cloud storage system from threshold encryption

被引:0
|
作者
Chuan Yao
Li Xu
Xinyi Huang
Joseph K. Liu
机构
[1] Fujian Normal University,Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Computer Science
[2] Key Lab of Broadband Wireless Communication and Sensor Network Technology,undefined
[3] Nanjing University of Posts and Telecommunications,undefined
[4] Ministry of Education,undefined
[5] Institute for Infocomm Research,undefined
关键词
Distributed storage; Storage; Threshold encryption; Security;
D O I
暂无
中图分类号
学科分类号
摘要
The confidentiality and integrity are the most important issues in cloud storage system. We address the privacy issue of decentralized cloud storage system using threshold cryptography. Once the user uploads his data and deletes the local copy, he might lost the full control of the data. The major challenges of designing this cloud storage system are to provide a better privacy guarantee and ensure the integrity of data at untrusted servers in distributed cloud storage system. To achieve this goal, we propose a threshold encryption scheme and integrate it with a secure decentralized erasure code to form a secure cloud storage system, where the user generates a secret parameter participated in system encryption and decryption of plaintext blocks in the combine process. So our systems can prevent cloud storage servers from modifying data by providing remote data check and meets the requirements of data robustness, confidentiality and integrity.
引用
收藏
页码:857 / 865
页数:8
相关论文
共 50 条
  • [1] A secure remote data integrity checking cloud storage system from threshold encryption
    Yao, Chuan
    Xu, Li
    Huang, Xinyi
    Liu, Joseph K.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (06) : 857 - 865
  • [2] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yong Yu
    Man Ho Au
    Yi Mu
    Shaohua Tang
    Jian Ren
    Willy Susilo
    Liju Dong
    [J]. International Journal of Information Security, 2015, 14 : 307 - 318
  • [3] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yu, Yong
    Au, Man Ho
    Mu, Yi
    Tang, Shaohua
    Ren, Jian
    Susilo, Willy
    Dong, Liju
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (04) : 307 - 318
  • [4] Data integrity checking with reliable data transfer for secure cloud storage
    Wang, Yong
    Tao, Xiaoling
    Ni, Jianbing
    Yu, Yong
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 106 - 121
  • [5] Certificateless remote data integrity checking using lattices in cloud storage
    Sasikala, C.
    Bindu, C. Shoba
    [J]. NEURAL COMPUTING & APPLICATIONS, 2019, 31 (05): : 1513 - 1519
  • [6] Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
    Liu, Zhangyun
    Liao, Yongjian
    Yang, Xiaowei
    He, Yichuan
    Zhao, Kun
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 128 - 135
  • [7] Public Auditing System: Improved Remote Data Possession Checking Protocol for Secure Cloud Storage
    Rashmi, Patil R.
    Sangve, S. M.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 75 - 80
  • [8] A Wew Remote Data Integrity Checking Scheme for Cloud storage With Privacy Preserving
    Yan, Xiangtao
    Li, Yifa
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 704 - 708
  • [9] Cryptanalysis of "Certificateless remote data integrity checking using lattices in cloud storage"
    Lan, Caihui
    Li, Haifeng
    Wang, Caifen
    [J]. 2020 10TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2020, : 134 - 138
  • [10] An efficient and secure protocol for checking remote data integrity in multi-cloud environment
    H. Anwarbasha
    S. Sasi Kumar
    D. Dhanasekaran
    [J]. Scientific Reports, 11