Public Data Integrity Verification for Secure Cloud Storage
نویسندگان
چکیده
Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users’ data is owned by cloud service providers physically, and the physical boundary between two users’ data is fuzzy. In this environment not controlled by users, a method to ensure users’ data integrity must be provided. In order to avoid retrieving enormous storage data and users themselves checking, a public auditing protocol was proposed based on the BLS short signature scheme and the homomorphic hash function. The user computed the signatures of the blocks, and moved them to cloud servers to store. Cloud service providers computed the aggregation of the blocks, and the aggregation of signatures. Third party auditor verified whether the aggregate data was consistent with the aggregate signature. If consistent, users’ data integrity was verified. Based on the computational DiffieHellman assumption, the presented protocol is secure against the lost attack and tamper attack from cloud service providers. Based on the stream encryption, the proposed protocol is secure against the curious attack from third party auditor. As the independence among blocks and block signatures, this protocol supports blocks’ update, including insertion, modification and deletion. So, the protocol is secure and efficient, and supports for public verification, dynamic update and privacy preserving.
منابع مشابه
Comparative Study of Public Auditing and Replica for Secure Cloud Storage
Using Cloud computing user can store their data secure without load of local user computer. And this feature additionally should be cable enough to provide user to maintain the cloud storage, as it is if same is maintained in the local, where no consideration required verifying the data integrity. On top by enabling and having public audit for cloud storage, which cab check the integrity of dat...
متن کاملPrivacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code
Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...
متن کاملRecord Maintenance and Secure Preserving Of Shared Data in Public Auditing
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کاملAuditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage
In cloud storage service, users upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of users’ data stored in the cloud storage, users need to verify the cloud storage remotely and periodically, with the help of the pre-stored authentication information and without storing a local copy of the data or retrieving back the dat...
متن کاملA Survey on Integrity Verification in Cloud Computing
Cloud computing has been popular as the IT architectures. Cloud service providers offers many services based on cloud computing. Cloud storage service is one of the cloud services which can provide a huge storage space to solve the bottleneck of the storage space of local end users. Here the Cloud server allows the users to store their data on cloud without worrying about correctness and integr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JNW
دوره 8 شماره
صفحات -
تاریخ انتشار 2013