Skip to main content
Top
Published in: Cluster Computing 3/2019

12-02-2018

Cloud data integrity checking using bilinear pairing and network coding

Authors: V. Balasubramanian, T. Mala

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Nowadays the user uses cloud storage to store their files. The cloud server provides excellent cloud services that is scalable. Also, the users is provided with the ability to share their data files with other users. The cloud service providers are not considered to be reliable. Since the stored data might be shared among multiple users, the integrity of the file remains a serious concern. Henceforth, examination of the integrity and dependability of data in the cloud becomes inevitable. Most of the remote data auditing schemes available validate the integrity of the data, nevertheless, it does not support data recovery, if data are lost or corrupted. Network coding based encoding can be used to support data recovery. In this paper, we intend a novel remote integrity scrutiny scheme which can be used to check data integrity as well as it facilitates data recovery.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: 8th International Conference on Network and Service Management and 2012 Workshop on Systems Virtualization Management, pp. 37–45, IEEE Press, Las Vegas (2012) Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: 8th International Conference on Network and Service Management and 2012 Workshop on Systems Virtualization Management, pp. 37–45, IEEE Press, Las Vegas (2012)
7.
9.
go back to reference Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29, 1709–1715 (2013)CrossRef Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29, 1709–1715 (2013)CrossRef
10.
go back to reference Juels, A., Kaliski,Jr., Burton S.: PORs: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communications Security, pp. 584–597, ACM Press, New York (2007) Juels, A., Kaliski,Jr., Burton S.: PORs: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communications Security, pp. 584–597, ACM Press, New York (2007)
11.
go back to reference Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.: Efficient remote data possession checking in critical information infrastructures. J. IEEE Trans Knowl. Data Eng. 20, 1034–1038 (2008)CrossRef Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.: Efficient remote data possession checking in critical information infrastructures. J. IEEE Trans Knowl. Data Eng. 20, 1034–1038 (2008)CrossRef
12.
go back to reference Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM Conference on Computer and Communications Security. pp. 598–609, ACM Press, New York (2007) https://doi.org/10.1145/1315245.1315318 Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM Conference on Computer and Communications Security. pp. 598–609, ACM Press, New York (2007) https://​doi.​org/​10.​1145/​1315245.​1315318
13.
go back to reference Xiao, D., Shu, J., Chen, K., Zheng, W.: A practical data possession checking scheme for networked archival storage. J. Comput. Res. Dev. 46, 1660–1668 (2009) Xiao, D., Shu, J., Chen, K., Zheng, W.: A practical data possession checking scheme for networked archival storage. J. Comput. Res. Dev. 46, 1660–1668 (2009)
14.
go back to reference Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-Replica Provable Data Possession. In: 28th International Conference on Distributed Computing Systems, pp. 411–420, Beijing (2008) Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-Replica Provable Data Possession. In: 28th International Conference on Distributed Computing Systems, pp. 411–420, Beijing (2008)
15.
go back to reference Erway, C., Kupccu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: 16th ACM Conference on Computer and Communications Security, pp. 213–222, ACM Press, New York (2009) Erway, C., Kupccu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: 16th ACM Conference on Computer and Communications Security, pp. 213–222, ACM Press, New York (2009)
16.
go back to reference Shacham H., Waters, B.: Compact proofs of retrievability. In: 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 90–107, Springer-Verlag (2008) Shacham H., Waters, B.: Compact proofs of retrievability. In: 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 90–107, Springer-Verlag (2008)
18.
go back to reference Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory. J. 56(9), 4539–4551 (2008)CrossRef Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory. J. 56(9), 4539–4551 (2008)CrossRef
19.
20.
go back to reference Boneh, D., Gentry, C., Lynn, B., Shacham H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in Cryptology—EUROCRYPT 2003, pp. 416–32, Springer-Verlag (2003) Boneh, D., Gentry, C., Lynn, B., Shacham H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in Cryptology—EUROCRYPT 2003, pp. 416–32, Springer-Verlag (2003)
Metadata
Title
Cloud data integrity checking using bilinear pairing and network coding
Authors
V. Balasubramanian
T. Mala
Publication date
12-02-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1805-z

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner