Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2016, Vol. 56 Issue (5) : 504-510     DOI: 10.16511/j.cnki.qhdxxb.2016.25.008
INFORMATION SECURITY |
LBT-based cloud data integrity verification scheme
LI Yong1,2, YAO Ge1, LEI Linan1, ZHANG Xiaofei3, YANG Kun4
1. School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China;
2. Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350007, China;
3. China Information Technology Security Evaluation Center, Beijing 100085, China;
4. National Institute of Metrology, Beijing 100029, China
Download: PDF(1097 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  With the rapid growth of cloud storage, more and more users are choosing to store their data in the cloud to reduce storage costs. However, users then lose control of the data and the data integrity cannot be ensured. Thus, cloud service providers (CSP) need to provide proof to users that their data is secure through an efficient integrity verification protocol. A number of feasible schemes have been proposed, but they have trouble supporting fully dynamic operations including insert, modify, and delete and they have large computing, storage and communication costs. This paper presents a data integrity verification scheme based on a large branching tree (LBT). The scheme supports fully dynamic updates and simplifies the dynamic update process by constructing a simple authentication tree. Tests show that the scheme reduces the computation of burden of the entities so that the method can be efficiently applied in the cloud environment to verify data integrity with frequent update operations.
Keywords cloud storage      data integrity      provable data prossession      proofs of retrievability     
ZTFLH:  TP393  
Issue Date: 15 May 2016
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
LI Yong
YAO Ge
LEI Linan
ZHANG Xiaofei
YANG Kun
Cite this article:   
LI Yong,YAO Ge,LEI Linan, et al. LBT-based cloud data integrity verification scheme[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(5): 504-510.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2016.25.008     OR     http://jst.tsinghuajournals.com/EN/Y2016/V56/I5/504
   
   
   
   
   
   
   
[1] 冯登国, 张敏, 张妍, 等. 云计算安全研究[J]. 软件学报, 2011,22(1):71-83. FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on cloud computing security[J].Journal of Software, 2011,22(1):71-83. (in Chinese)
[2] Ateniese G, Burns R, Curtmola R. Provable data possession at untrusted stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007). New York, USA:ACM Press, 2007:598-609.
[3] Ateniese G, Pietro R D, Mancini L, et al. Scalable and efficient provable data possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm'08). New York, USA:ACM Press, 2008:1-10.
[4] WANG Huaqun. Identity-based distributed provable data possession in multicloud storage[J].IEEE Transactions on Services Computing, 2015,8(2):328-340
[5] Juels A, Kaliski B S. PORs:Proofs of retrievability for large files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007). New York, USA:ACM Press, 2007:584-597.
[6] Shacham H, Waters B. Compact proofs of retrievability[C]//Proceedings of 14th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'08). Berlin, Germany:Springer-Verlag Press, 2008:90-107.
[7] 谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015,38(1):164-177. TAN Shuang, JIA Yan, HAN Weihong. Research and development of provable data integrity in cloud storage[J].Chinese Journal of Computers, 2015,38(1):164-177. (in Chinese)
[8] Erway C, Kupccu A, Papamathou C, et al. Dynamic provable data possession[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009). New York, USA:ACM Press, 2009:213-222.
[9] ZHU Yan, HU Hongxin, AHN G J, et al. Efficient audit service outsourcing for data integrity in clouds[J].Journal of Systems and Software, 2012,85(5):1083-1095.
[10] ZHU Yan, HU Hongxin, AHN G J, et al. Cooperative provable data possession for integrity verification in multi-cloud storage[J].IEEE Transactions on Parallel and Distributed Systems, 2012,23(12):2231-2244.
[11] WANG Qian, WANG Cong, LI Jin, et al. Enabling public verifiability and data dynamics for storage security in cloud computing[C]//Proceedings of 14th European Symposium on Research in Computer Security (ESORICS 2009). Berlin, Germany:Springer-Verlag Press, 2009:355-370.
[12] Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing[C]//Proceedings of Seventh International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT'01). Berlin, Germany:Springer-Verlag Press, 2001:514-532.
[1] CAO Laicheng, WU Qirui, WANG Yafei, WU Rong, GUO Xian. Efficient semantic-based multiuser search scheme[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1228-1233.
[2] CAO Laicheng, LIU Yufei, DONG Xiaoye, GUO Xian. User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 150-156.
[3] CAO Laicheng, HE Wenwen, LIU Yufei, GUO Xian, FENG Tao. Cooperative dynamic data possession scheme across a cloud storage environment[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(10): 1048-1055.
[4] WANG Weiping, ZHANG Junfeng, WANG Jianxin. Data integrity check based on null space for network coding based cloud storage[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 83-88,96.
[5] Dongri YANG, Ying WANG, Peng LIU. Fault-tolerant mechanism combined with replication and error correcting code for cloud file systems[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1): 137-144.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd