Skip to main content
Top

2017 | OriginalPaper | Chapter

Cloud Data Integrity Checking with Deduplication for Confidential Data Storage

Authors : Hongyu Liu, Leiting Chen, Liyao Zeng

Published in: Cyberspace Safety and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Data loss is a severe issue in cloud storage due to a number of confidential files stored on the cloud and thus, cloud servers have become the target of attackers. In this paper, we propose a cloud data integrity checking protocol with deduplication, which can guarantee the remote data integrity while achieving secure deduplication within the same framework. Another bonus of our construction is privacy preserving of the outsourced data, which is denoted as zero-knowledge data privacy, indicating that the third party auditor learns nothing about the stored data during the auditing process. In addition, we demonstrate the performance of our construction by developing a prototype of the protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Timothy, G., Peter, M.M.: The NIST definition of cloud computing, vol. NIST SP-800-145, September 2011 Timothy, G., Peter, M.M.: The NIST definition of cloud computing, vol. NIST SP-800-145, September 2011
3.
go back to reference Frankie, L., Anthony, L., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (2011) Frankie, L., Anthony, L., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (2011)
4.
go back to reference Du, X., Xiao, Y., et al.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007). ElsevierCrossRef Du, X., Xiao, Y., et al.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007). ElsevierCrossRef
5.
go back to reference Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wireless Commun. 8(3), 1223–1229 (2009)CrossRef Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wireless Commun. 8(3), 1223–1229 (2009)CrossRef
6.
go back to reference Du, X., Lin, F.: Maintaining differentiated coverage in heterogeneous sensor networks. EURASIP J. Wireless Commun. Netw. 5(4), 565–572 (2005)MATH Du, X., Lin, F.: Maintaining differentiated coverage in heterogeneous sensor networks. EURASIP J. Wireless Commun. Netw. 5(4), 565–572 (2005)MATH
7.
go back to reference Xiao, Y., Chen, H.H., Du, X., Guizani, M.: Stream-based cipher feedback mode in wireless error channel. IEEE Trans. Wireless Commun. 8(2), 662–666 (2009)CrossRef Xiao, Y., Chen, H.H., Du, X., Guizani, M.: Stream-based cipher feedback mode in wireless error channel. IEEE Trans. Wireless Commun. 8(2), 662–666 (2009)CrossRef
8.
go back to reference Du, X., Zhang, M., et al.: Self-healing sensor networks with distributed decision making. Int. J. Sensor Netw. 2(5/6), 289–298 (2007)CrossRef Du, X., Zhang, M., et al.: Self-healing sensor networks with distributed decision making. Int. J. Sensor Netw. 2(5/6), 289–298 (2007)CrossRef
9.
go back to reference Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)CrossRef Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)CrossRef
11.
go back to reference Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)CrossRef Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)CrossRef
12.
go back to reference Ateniese, G., Burns, R., et al.: Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Communications Security, New York, NY, USA (2007) Ateniese, G., Burns, R., et al.: Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Communications Security, New York, NY, USA (2007)
14.
go back to reference Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 4, 767–778 (2017)CrossRef Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 4, 767–778 (2017)CrossRef
15.
go back to reference Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)CrossRef Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)CrossRef
16.
go back to reference Li, Y., Yu, Y., Susilo, W., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure. Comput. (2016). doi:10.1109/TDSC.2017.2662216 Li, Y., Yu, Y., Susilo, W., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure. Comput. (2016). doi:10.​1109/​TDSC.​2017.​2662216
19.
go back to reference Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS 2012, pp. 81–82 (2012) Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS 2012, pp. 81–82 (2012)
20.
go back to reference Qingji, Z., Shouhuai, X.: Secure and efficient proof of storage with deduplication. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, pp. 1–12, New York, USA (2012) Qingji, Z., Shouhuai, X.: Secure and efficient proof of storage with deduplication. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, pp. 1–12, New York, USA (2012)
21.
go back to reference Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)CrossRefMATHMathSciNet Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)CrossRefMATHMathSciNet
Metadata
Title
Cloud Data Integrity Checking with Deduplication for Confidential Data Storage
Authors
Hongyu Liu
Leiting Chen
Liyao Zeng
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-69471-9_34

Premium Partner