A Remote File Possession Checking Protocol in a Cloud Storage

被引:0
|
作者
Deng, Zuojie [1 ,2 ]
Tan, Xiaolan [1 ]
机构
[1] Hunan Inst Engn, Sch Comp & Commun, Xiangtan 411104, Hunan, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
关键词
File possession checking; Provable security; DLP; Cloud storage;
D O I
10.14257/ijfgcn.2015.8.6.11
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Outsourcing a file to a remote cloud storage provides several benefits, including scalability, accessibility, data replication and considerable cost saving. Unfortunately, when we send a file to a remote cloud storage server, we do not know if this file is intact. To address this problem, we present a remote file possession checking protocol. In this protocol, we use three technologies: Firstly, we design a kind of file block tag whose security is based on the discrete logarithm problem (DLP); secondly, we use probability checking method to improve its effectiveness; thirdly, we use tag aggregation method to reduce its communication cost. Our theory analysis and experiment results show that our protocol is practical and secure.
引用
收藏
页码:115 / 121
页数:7
相关论文
共 50 条
  • [1] An Improved Remote Data Possession Checking Protocol in Cloud Storage
    Zhou, Enguang
    Li, Zhoujun
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 611 - 617
  • [2] A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Han, Jinguang
    Zhang, Yichen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) : 78 - 88
  • [3] Improved security of a dynamic remote data possession checking protocol for cloud storage
    Yu, Yong
    Ni, Jianbing
    Au, Man Ho
    Liu, Hongyu
    Wang, Hua
    Xu, Chunxiang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (17) : 7789 - 7796
  • [4] Data dynamics for remote data possession checking in cloud storage
    Chen, Lanxiang
    Zhou, Shuming
    Huang, Xinyi
    Xu, Li
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2413 - 2424
  • [5] On the Security of a Remote Data Possession Checking Scheme in Cloud Storage
    Liang, XinLong
    Jiang, Rui
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA), 2014, : 96 - 99
  • [6] Remote data possession checking with enhanced security for cloud storage
    Yu, Yong
    Zhang, Yafang
    Ni, Jianbing
    Au, Man Ho
    Chen, Lanxiang
    Liu, Hongyu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 77 - 85
  • [7] Public Auditing System: Improved Remote Data Possession Checking Protocol for Secure Cloud Storage
    Rashmi, Patil R.
    Sangve, S. M.
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 75 - 80
  • [8] Multiple-File Remote Data Checking for cloud storage
    Xiao, Da
    Yang, Yan
    Yao, Wenbin
    Wu, Chunhua
    Liu, Jianyi
    Yang, Yixian
    [J]. COMPUTERS & SECURITY, 2012, 31 (02) : 192 - 205
  • [9] A hill cipher-based remote data possession checking in cloud storage
    Chen, Lanxiang
    Guo, Gongde
    Peng, Zhen
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 511 - 518
  • [10] Remote data possession checking with privacy-preserving authenticators for cloud storage
    Shen, Wenting
    Yang, Guangyang
    Yu, Jia
    Zhang, Hanlin
    Kong, Fanyu
    Hao, Rong
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 76 : 136 - 145