Using algebraic signatures to check data possession in cloud storage

被引:75
作者
Chen, Lanxiang [1 ,2 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350108, Peoples R China
[2] Key Lab Network Secur & Cryptol, Fuzhou 350108, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2013年 / 29卷 / 07期
关键词
Cloud storage; Storage security; Remote data possession checking; Algebraic signature; PROOFS;
D O I
10.1016/j.future.2012.01.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud storage enables users to access their data anywhere and at any time. It also can comply with a growing number of regulations. However, it brings about many new security challenges. When users store their data in cloud storage, they are mostly concerned about whether the data is intact. This is the goal of remote data possession checking (RDPC) schemes. This paper proposes an algebraic signature based RDPC scheme. Algebraic signature can improve efficiency and the running of algebraic signature can achieve tens to hundreds of megabytes per second. It allows verification without the need for the challenger to compare against the original data. The challenge/response protocol transmits a small, constant amount of data. The user needs to store only two secret keys and several random numbers. The algebraic property of algebraic signatures makes it possible to propose an efficient challenge updating method. Finally, experimental results reveal that the performance is bound by disk I/O and not by the algebraic signature and cryptographic computation, which enables it to be ideally suited for use in cloud storage. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1709 / 1715
页数:7
相关论文
共 28 条
[1]  
[Anonymous], 1983, THEORY ERROR CORRECT
[2]  
[Anonymous], COMPUTER SECURITY ES
[3]  
[Anonymous], P INFOCOM 2010 SAN D
[4]  
[Anonymous], 2011, INT J DIGIT CONTENT
[5]  
[Anonymous], 2006150 IACR EPRINT
[6]  
[Anonymous], P 2004 INT C PAR DIS
[7]  
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[8]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[9]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[10]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319