Skip to main content

2017 | OriginalPaper | Buchkapitel

Cloud Data Integrity Checking with Deduplication for Confidential Data Storage

verfasst von : Hongyu Liu, Leiting Chen, Liyao Zeng

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data loss is a severe issue in cloud storage due to a number of confidential files stored on the cloud and thus, cloud servers have become the target of attackers. In this paper, we propose a cloud data integrity checking protocol with deduplication, which can guarantee the remote data integrity while achieving secure deduplication within the same framework. Another bonus of our construction is privacy preserving of the outsourced data, which is denoted as zero-knowledge data privacy, indicating that the third party auditor learns nothing about the stored data during the auditing process. In addition, we demonstrate the performance of our construction by developing a prototype of the protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Timothy, G., Peter, M.M.: The NIST definition of cloud computing, vol. NIST SP-800-145, September 2011 Timothy, G., Peter, M.M.: The NIST definition of cloud computing, vol. NIST SP-800-145, September 2011
3.
Zurück zum Zitat Frankie, L., Anthony, L., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (2011) Frankie, L., Anthony, L., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (2011)
4.
Zurück zum Zitat Du, X., Xiao, Y., et al.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007). ElsevierCrossRef Du, X., Xiao, Y., et al.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007). ElsevierCrossRef
5.
Zurück zum Zitat Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wireless Commun. 8(3), 1223–1229 (2009)CrossRef Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wireless Commun. 8(3), 1223–1229 (2009)CrossRef
6.
Zurück zum Zitat Du, X., Lin, F.: Maintaining differentiated coverage in heterogeneous sensor networks. EURASIP J. Wireless Commun. Netw. 5(4), 565–572 (2005)MATH Du, X., Lin, F.: Maintaining differentiated coverage in heterogeneous sensor networks. EURASIP J. Wireless Commun. Netw. 5(4), 565–572 (2005)MATH
7.
Zurück zum Zitat Xiao, Y., Chen, H.H., Du, X., Guizani, M.: Stream-based cipher feedback mode in wireless error channel. IEEE Trans. Wireless Commun. 8(2), 662–666 (2009)CrossRef Xiao, Y., Chen, H.H., Du, X., Guizani, M.: Stream-based cipher feedback mode in wireless error channel. IEEE Trans. Wireless Commun. 8(2), 662–666 (2009)CrossRef
8.
Zurück zum Zitat Du, X., Zhang, M., et al.: Self-healing sensor networks with distributed decision making. Int. J. Sensor Netw. 2(5/6), 289–298 (2007)CrossRef Du, X., Zhang, M., et al.: Self-healing sensor networks with distributed decision making. Int. J. Sensor Netw. 2(5/6), 289–298 (2007)CrossRef
9.
Zurück zum Zitat Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)CrossRef Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)CrossRef
11.
Zurück zum Zitat Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)CrossRef Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)CrossRef
12.
Zurück zum Zitat Ateniese, G., Burns, R., et al.: Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Communications Security, New York, NY, USA (2007) Ateniese, G., Burns, R., et al.: Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Communications Security, New York, NY, USA (2007)
14.
Zurück zum Zitat Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 4, 767–778 (2017)CrossRef Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 4, 767–778 (2017)CrossRef
15.
Zurück zum Zitat Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)CrossRef Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)CrossRef
16.
Zurück zum Zitat Li, Y., Yu, Y., Susilo, W., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure. Comput. (2016). doi:10.1109/TDSC.2017.2662216 Li, Y., Yu, Y., Susilo, W., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure. Comput. (2016). doi:10.​1109/​TDSC.​2017.​2662216
18.
19.
Zurück zum Zitat Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS 2012, pp. 81–82 (2012) Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS 2012, pp. 81–82 (2012)
20.
Zurück zum Zitat Qingji, Z., Shouhuai, X.: Secure and efficient proof of storage with deduplication. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, pp. 1–12, New York, USA (2012) Qingji, Z., Shouhuai, X.: Secure and efficient proof of storage with deduplication. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, pp. 1–12, New York, USA (2012)
21.
Zurück zum Zitat Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)CrossRefMATHMathSciNet Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)CrossRefMATHMathSciNet
Metadaten
Titel
Cloud Data Integrity Checking with Deduplication for Confidential Data Storage
verfasst von
Hongyu Liu
Leiting Chen
Liyao Zeng
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-69471-9_34