Provable Data Possession in Cloud Computing

Article Preview

Abstract:

Several trends are opening up the era of cloud computing. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This work studies the problem of ensuring the integrity of data storage in cloud computing. We use RSAs homomorphic property to construct the protocol of provable data possession. In our protocol, we can aggregate multiple Provable Data possession into one, and reduce the overhead of communication. While prior work on ensuring remote data integrity often lacks the specific implementations, this paper achieves an effective proof of storage protocol. Extensive security and performance analysis show that the proposed scheme is highly efficient and provably secure.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1406-1413

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] K. Julisch and M. Hall, Security and control in the cloud, Information Security Journal: A Global Perspective, vol. 19, no. 6, p.299–309, (2010).

DOI: 10.1080/19393555.2010.514654

Google Scholar

[2] R. Wong, A. Fu, K. Wang, and J. Pei, Minimality attack in privacy preserving data publishing., VLDB Endowment, p.543–554.

Google Scholar

[3] Y. Deswarte, J. Quisquater, and A. Sadane, Remote integrity checking, Integrity and Internal Control in Information Systems VI, p.1–11, (2004).

DOI: 10.1007/1-4020-7901-x_1

Google Scholar

[4] K. Zeng, Publicly verifiable remote data integrity, Information and Communications Security, p.419–434, (2008).

Google Scholar

[5] D. L. Gazzoni Filho and P. Barreto, Demonstrating data possession and uncheatable data transfer, Book Demonstrating.

Google Scholar

[6] data possession and uncheatable data transfer, Series Demonstrating data possession and uncheatable data transfer, ed., Editor ed. ˆ eds., Citeseer, p.150, 2006. G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, Remote data checking using provable data possession, ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, p.12, (2011).

DOI: 10.1145/1952982.1952994

Google Scholar

[7] G. Ateniese, R. Di Pietro, L. Mancini, and G. Tsudik, Scalable and efficient provable data possession, in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, p.9.

DOI: 10.1145/1460877.1460889

Google Scholar

[8] C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring data storage security in cloud computing., Ieee, p.1–9.

Google Scholar

[9] R. Curtmola, O. Khan, and R. Burns, Robust remote data checking, in Proceedings of the 4th ACM international workshop on Storage security and survivability. ACM, p.63–68.

DOI: 10.1145/1456469.1456481

Google Scholar

[10] A. Barsoum and M. Hasan, Provable possession and replication of data over cloud servers, Centre For Applied Cryptographic Research (CACR), University of Waterloo, Report, vol. 32, p.2010, (2010).

Google Scholar

[11] H. Shacham and B. Waters, Compact proofs of retrievability, Advances in Cryptology-ASIACRYPT 2008, p.90–107, (2008).

DOI: 10.1007/978-3-540-89255-7_7

Google Scholar

[12] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, Mr-pdp: Multiple-replica provable data possession, " in Distributed Computing Systems, 2008. ICDCS, 08. The 28th International Conference on. IEEE, p.411–420.

DOI: 10.1109/icdcs.2008.68

Google Scholar

[13] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz,A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica, Above the clouds: A berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Tech. Rep., (2009).

DOI: 10.1145/1721654.1721672

Google Scholar

[14] P. Golle, J. Staddon, and B. Waters, Secure conjunctive keyword search over encrypted data., Springer, p.31–45.

DOI: 10.1007/978-3-540-24852-1_3

Google Scholar

[15] F. Seb, J. Domingo-Ferrer, A. Martinez-Balleste,Y. Deswarte, and J. Quisquater, Efficient remote data possession checking in critical information infrastructures.

DOI: 10.1109/tkde.2007.190647

Google Scholar

[16] Knowledge and Data Engineering, IEEE Transactions on, vol. 20, no. 8, p.1034–1038, (2008).

Google Scholar

[17] C. Erway, A. Kp, C. Papamanthou, and R. Tamassia, Dynamic provable data possession, in Proceedings of the 16th ACM conference on Computer and communications security. ACM, p.213–222.

DOI: 10.1145/1653662.1653688

Google Scholar

[18] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, Provable data possession at untrusted stores., ACM, p.598–609.

DOI: 10.1145/1315245.1315318

Google Scholar

[19] C. Wang, Q. Wang, K. Ren, and W. Lou, Privacypreserving public auditing for data storage security in cloud computing. " IEEE, p.1–9. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing, Computer SecurityESORICS 2009, p.355–370, (2009).

DOI: 10.1007/978-3-642-04444-1_22

Google Scholar