JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (5): 81-87.doi: 10.6040/j.issn.1671-9352.2.2019.146

Previous Articles    

A not-same frequency remote data possession checking method

MA Hai-feng1, YANG Jia-hai2, XUE Qing-shui1*, JU Xing-zhong1, ZHU Hao-zhi1, LIN Tao1, YUAN Xin-xin1   

  1. 1. School of Computer Science and Information Engineering, Shanghai Institute of Technology, Shanghai 201418, China;
    2. Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
  • Published:2020-05-06

Abstract: The proposed not-same frequency verification mode can significantly reduce the detection delay after the occurrence of file corruption. Furthermore, the proposed not-same frequency enhanced remote data possession checking method can reduce the delay of corrupt data detection and prevent replace attack and so on. Security proof and experiments show that the proposed method is secure. And under the experimental samples, NE-RDPC has 19.3% performance improvement in average than E-RDPC.

Key words: cloud storage, data integrity, data possession checking, homomorphic tag, Hash tree

CLC Number: 

  • TP309
[1] REN K, WANG C, WANG Q. Security challenges for the public cloud[J]. IEEE Internet Computing, 2012, 16(1):69-73.
[2] 姚克, 杨海宁, 秦静. 云存储中可验证完整性的可搜索加密协议[J]. 山东大学学报(理学版), 2019, 54(1):67-78. YAO Ke, YANG Haining, QIN Jing. Searchable encryption with data integrity verification in cloud storage[J]. Journal of Shandong University(Natural Science), 2019, 54(1):67-78.
[3] ATENIESE G, BUMS R, CURTMOL A, et al. Provable data possession at untrusted stores[C] //14th ACM CCS,[S.l.] :[s.n.] , 2007: 598-609.
[4] 谭霜, 贾焰, 韩伟红. 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015, 38(1):164-177. TAN Shuang, JIA Yan, HAN Weihong. Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015, 38(1):164-177.
[5] 李晖, 孙文海, 李凤华,等. 公共云存储服务数据安全及隐私保护技术综述[J]. 计算机研究与发展, 2014, 51(7):1397-1409. LI Hui, SUN Wenhai, LI Fenghua, et al. Secure and privacy-preserving data storage service in public cloud[J]. Journal of Computer Research and Development, 2014, 51(7):1397-1409.
[6] JUELS A, Jr KALISKI B S. Pors: proofs of retrievability for large files[C] //Proceedings of the 14th ACM conference on Computer and Communications Security(CCS '07). New York: ACM Press, 2007: 584-597.
[7] WANG Y J, WU Q H, QIN B, et al. Identity-based data outsourcing with comprehensive auditing in clouds[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4):940-952.
[8] 韩盼盼, 秦静. 云计算中可验证的外包数据库加密搜索方案[J]. 山东大学学报(理学版), 2017, 52(9):41-53. HAN Panpan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing[J]. Journal of Shandong University(Natural Science), 2017, 52(9):41-53.
[9] ERWAY C, KUPCU A, PAPAMANTHOU C, et al. Dynamic provable data possession[C] //16th ACM CCS.[S.l.] :[s.n.] , 2009: 213-222.
[10] SHACHAM H, WATERS B. Compact proofs of retrievability[J]. Journal of Cryptology, 2013, 26(3):442-483.
[11] BOWERS K, JUELS A, OPERA A. Proofs of retrievability: theory and implementation[C] //Proceedings of ACM Workshop on Cloud Computing Security. Chicago:[s.n.] , 2009: 43-53.
[12] CHEN L X, ZHOU S M, HUANG X Y, et al. Data dynamics for remote data possession checking in cloud storage[J]. Computers & Electrical Engineering, 2013, 39(7):2413-2424.
[13] YU Y, NI J B, AU M H, et al. Improved security of a dynamic remote data possession checking protocol for cloud storage[J]. Expert Systems with Applications, 2014, 41(17):7789-7796.
[14] WANG C, WANG Q, REN K, et al. Privacy-preserving public auditing for data storage security in cloud computing[C] //2010 Proceedings IEEE INFOCOM. San Diego: IEEE, 2010: 525-533.
[15] YU Y, AU M H, ATENIESE G, et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4):767-778.
[16] SHEN W T, QIN J, YU J, et al. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(2):331-346.
[17] ZHANG J H, DONG Q C. Efficient ID-based public auditing for the outsourced data in cloud storage[J]. Information Sciences, 2016, 343/344:1-14.
[1] YAO Ke, YANG Hai-ning, QIN Jing. Searchable encryption with data integrity verification in cloud storage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(1): 67-78.
[2] LIU Wen-zhuo, CAO Tian-jie, HUANG Shi. An efficient multiple-replica data possession checking scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 160-165.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!