Skip to main content
Erschienen in: Cluster Computing 4/2014

01.12.2014

Efficient public verification proof of retrievability scheme in cloud

verfasst von: Jianhong Zhang, Wenjing Tang, Jian Mao

Erschienen in: Cluster Computing | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage is an important service of cloud computing. After data file is outsourced, data owner no longer physical controls over the storage. To efficiently verify these data integrity, several Proof of Retrievability (POR) schemes were proposed to achieve data integrity checking. The existing POR schemes offer decent solutions to address various practical issues, however, they either have a non-trivial (linear or quadratic) communication cost, or only support private verification. And most of the existing POR schemes exist active attack and information leakage problem in the data checking procedure. It remains open to design a secure POR scheme with both public verifiability and constant communication cost. To solve the above problems , we propose a novel preserving-private POR scheme with public verifiability and constant communication cost based on end-to-end aggregation authentication in this paper. To resist information leakage, we include zero-knowledge technique to hide the data in the integrity checking process. Our scheme is shown to be secure and efficient by security analysis and performance analysis. The security of our scheme is related to the Computational Diffie–Helleman Problem and Discrete logarithm problem. Finally, we also extend the POR scheme to support multi-file integrity checking and simulation results show that the verifier only needs less computational cost to achieve data integrity checking in our extended scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Timothy, G., Peter, M.M.: The nist definition of cloud computing. NIST SP 800–145 September (2011) Timothy, G., Peter, M.M.: The nist definition of cloud computing. NIST SP 800–145 September (2011)
6.
Zurück zum Zitat Juels, A.; Kaliski, B.S. Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security, CCS’07 584–597, New York, NY, USA, ACM (2007) Juels, A.; Kaliski, B.S. Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security, CCS’07 584–597, New York, NY, USA, ACM (2007)
7.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. Proceedings of the 14th ACM conference on Computer and communications security. CCS’07, pp. 598–609. NY, USA, ACM, New York (2007) Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. Proceedings of the 14th ACM conference on Computer and communications security. CCS’07, pp. 598–609. NY, USA, ACM, New York (2007)
8.
Zurück zum Zitat Shacham, H., Waters, B.: Compact proofs of retrievability, ASIACRYPT’08, LNCS 3123, pp. 90–107, Springer, Berlin (2008) Shacham, H., Waters, B.: Compact proofs of retrievability, ASIACRYPT’08, LNCS 3123, pp. 90–107, Springer, Berlin (2008)
9.
Zurück zum Zitat Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, TCC’09, pp. 109–127, Berlin, Heidelberg (2009) Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, TCC’09, pp. 109–127, Berlin, Heidelberg (2009)
10.
Zurück zum Zitat Jia, X., Ee-Chien, C.: Towards efficient provable data possession. ASIACCS’12, pp. 79–80, May 2–4, Seoul, Korea (2012) Jia, X., Ee-Chien, C.: Towards efficient provable data possession. ASIACCS’12, pp. 79–80, May 2–4, Seoul, Korea (2012)
11.
Zurück zum Zitat Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. CloudComputing’13, pp. 19–26 (2003) Yuan, J., Yu, S.: Proofs of retrievability with public verifiability and constant communication cost in cloud. CloudComputing’13, pp. 19–26 (2003)
12.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 22(5), 847–859 (2011)CrossRef
13.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proc. of INFOCOM. IEEE pp. 525–533 (2010) Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proc. of INFOCOM. IEEE pp. 525–533 (2010)
14.
Zurück zum Zitat Boyang W., Li, B., Li, H., Li, H.: Certificateless public auditing for data integrity in the cloud. IEEE-CNS 2013, pp. 36–144, Washington D.C., October 14–16 (2013) Boyang W., Li, B., Li, H., Li, H.: Certificateless public auditing for data integrity in the cloud. IEEE-CNS 2013, pp. 36–144, Washington D.C., October 14–16 (2013)
15.
Zurück zum Zitat Wang, B., Chow, S.S.M., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. IEEE-ICDCS 2013, pp. 124–133, Philadelphia, Pennsylvania, July 8–11 (2013) Wang, B., Chow, S.S.M., Li, M., Li, H.: Storing shared data on the cloud via security-mediator. IEEE-ICDCS 2013, pp. 124–133, Philadelphia, Pennsylvania, July 8–11 (2013)
16.
Zurück zum Zitat Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. IEEE-ICC 2011 539–543 Budapest, Hungary, June 9–13 (2013) Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. IEEE-ICC 2011 539–543 Budapest, Hungary, June 9–13 (2013)
17.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. IEEE-INFOCOM 2013, pp. 2904–2912, Turin, Italy, April 14–19 (2013) Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. IEEE-INFOCOM 2013, pp. 2904–2912, Turin, Italy, April 14–19 (2013)
18.
Zurück zum Zitat Bellare, M.; Palacio, A.: The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. Proc. CRYPTO’04, LNCS 3152, Springer, Berlin 273–289 (2004) Bellare, M.; Palacio, A.: The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. Proc. CRYPTO’04, LNCS 3152, Springer, Berlin 273–289 (2004)
19.
Zurück zum Zitat Ma, D., Zhu, Y., Yu, M.: End-to-end aggregate authentication of time-series data. ACM Workshop on Asia Public-Key Cryptography (AsiaPKC) 51–66 May (2013) Ma, D., Zhu, Y., Yu, M.: End-to-end aggregate authentication of time-series data. ACM Workshop on Asia Public-Key Cryptography (AsiaPKC) 51–66 May (2013)
20.
Zurück zum Zitat Boneh, D., Boyen, X.: Short signatures without random oracles, Eurocrypt 2004. LNCS 3027, 56–73 (2004) Boneh, D., Boyen, X.: Short signatures without random oracles, Eurocrypt 2004. LNCS 3027, 56–73 (2004)
21.
Zurück zum Zitat Xavier, B.:The uber-assumption family a unified complexity framework for bilinear groups, Pairing 2008, LNCS 5209, pp. 39–56 (2008) Xavier, B.:The uber-assumption family a unified complexity framework for bilinear groups, Pairing 2008, LNCS 5209, pp. 39–56 (2008)
22.
Zurück zum Zitat Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In Proc. Adv. CryptologyłCrypto, ser. LNCS, vol. 3152. Springer, New York pp. 41–45 (2004) Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In Proc. Adv. CryptologyłCrypto, ser. LNCS, vol. 3152. Springer, New York pp. 41–45 (2004)
Metadaten
Titel
Efficient public verification proof of retrievability scheme in cloud
verfasst von
Jianhong Zhang
Wenjing Tang
Jian Mao
Publikationsdatum
01.12.2014
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 4/2014
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-014-0394-8

Weitere Artikel der Ausgabe 4/2014

Cluster Computing 4/2014 Zur Ausgabe

Premium Partner