A Remote Data Integrity Verification Scheme Based on Cloud Computing

Article Preview

Abstract:

Aiming at solving data integrity protection problems in the cloud , a remote data integrity verification scheme is proposed. Firstly, the data integrity verification is constructed based on homomorphic identification and data fragment structure. Secondly, by introducing random mask, the public verification is realized and by building index-hash table (IHT), the scheme can support dynamic verification. Finally, use the MapReduce for parallel computing, which reduces computation overhead side and storage overhead. The security and performance analyses show that our proposed scheme is secure and reliable.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1923-1926

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Xiongding Nie, Dezhi Han, Kun Bi. Cloud computing data security [J]. Joutnal of Jilin University (Engineering and Technology Edition), 2012, 42: 332-336.

Google Scholar

[2] Amazon Web Service, Amazon S3 Availability Event: July 20, 2008 , http: /status. aws. amazon. com/s3-20080720. html, July (2008).

Google Scholar

[3] Lanxiang Chen, Li Xu. Research on provable data possession and recovery technology in cloud storage [J]. Jounal of Computer Research and Development, 2012, 49: 19-25.

Google Scholar

[4] A. Juels, B.S. Jr Kaliski. PORs: proofs retrievability for large files[C]. Proc of 14th ACM Conference on computer and Communications Security. New York: ACM Press, 2007: 584-597.

DOI: 10.1145/1315245.1315317

Google Scholar

[5] G. Ateniese, R. Burns, R. Curtmola, et al. Provable data possession at untrusted stores [J]. Proc of CCS'07. New York: ACM, 2007, 598-609.

DOI: 10.1145/1315245.1315318

Google Scholar

[6] Cong Wang, S. M Sherman. Chow, Qian Wang, et al. Privacy-reserving public auditing for secure cloud storage [J]. IEEE TRANSACTIONS ON COMPUTINGS, 2013, 62(2): 362-374.

DOI: 10.1109/tc.2011.245

Google Scholar

[7] Yan Zhu, Gail-Joon Ahn, Hongxin Hu, et al. Dynamic audit services for outsourced storages in clouds [J]. IEEE TRANSACTION ON SERVICES COMPUTING, 2013, 6(2): 227-237.

DOI: 10.1109/tsc.2011.51

Google Scholar

[8] Kan Yang, Xiaohua Jia. An efficient and secure dynamic auditing protocol for data storage in cloud computing [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24(9): 1717-1726.

DOI: 10.1109/tpds.2012.278

Google Scholar