Public Data Integrity Verification for Secure Cloud Storage

نویسندگان

  • Hongwei Liu
  • Peng Zhang
  • Jun Liu
چکیده

Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users’ data is owned by cloud service providers physically, and the physical boundary between two users’ data is fuzzy. In this environment not controlled by users, a method to ensure users’ data integrity must be provided. In order to avoid retrieving enormous storage data and users themselves checking, a public auditing protocol was proposed based on the BLS short signature scheme and the homomorphic hash function. The user computed the signatures of the blocks, and moved them to cloud servers to store. Cloud service providers computed the aggregation of the blocks, and the aggregation of signatures. Third party auditor verified whether the aggregate data was consistent with the aggregate signature. If consistent, users’ data integrity was verified. Based on the computational DiffieHellman assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the stream encryption, the proposed protocol is secure against the curious attack from third party auditor. As the independence among blocks and block signatures, this protocol supports blocks’ update, including insertion, modification and deletion. So, the protocol is secure and efficient, and supports for public verification, dynamic update and privacy preserving.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Study of Public Auditing and Replica for Secure Cloud Storage

Using Cloud computing user can store their data secure without load of local user computer. And this feature additionally should be cable enough to provide user to maintain the cloud storage, as it is if same is maintained in the local, where no consideration required verifying the data integrity. On top by enabling and having public audit for cloud storage, which cab check the integrity of dat...

متن کامل

Privacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code

Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...

متن کامل

Record Maintenance and Secure Preserving Of Shared Data in Public Auditing

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...

متن کامل

Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage

In cloud storage service, users upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of users’ data stored in the cloud storage, users need to verify the cloud storage remotely and periodically, with the help of the pre-stored authentication information and without storing a local copy of the data or retrieving back the dat...

متن کامل

A Survey on Integrity Verification in Cloud Computing

Cloud computing has been popular as the IT architectures. Cloud service providers offers many services based on cloud computing. Cloud storage service is one of the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. Here the Cloud server allows the users to store their data on cloud without worrying about correctness and integr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JNW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013