Mutual Verifiable Provable Data Auditing in Public Cloud Storage

被引:359
作者
Ren, Yongjun [1 ,2 ]
Shen, Jian [1 ,2 ]
Wang, Jin [1 ,2 ]
Han, Jin [1 ,2 ]
Lee, Sungyoung [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2015年 / 16卷 / 02期
基金
新加坡国家研究基金会;
关键词
Cloud computing; Data storage auditing; Provable data possession; Key agreement; ENERGY-EFFICIENT;
D O I
10.6138/JIT.2015.16.2.20140918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is now a hot research topic in information technology. In cloud storage, date security properties such as data confidentiality, integrity and availability become more and more important in many commercial applications. Recently, many provable data possession (PDP) schemes are proposed to protect data integrity. In some cases, it has to delegate the remote data possession checking task to some proxy. However, these PDP schemes are not secure since the proxy stores some state information in cloud storage servers. Hence, in this paper, we propose an efficient mutual verifiable provable data possession scheme, which utilizes Diffie-Hellman shared key to construct the homomorphic authenticator. In particular, the verifier in our scheme is stateless and independent of the cloud storage service. It is worth noting that the presented scheme is very efficient compared with the previous PDP schemes, since the bilinear operation is not required.
引用
收藏
页码:317 / 323
页数:7
相关论文
共 15 条
[1]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[2]  
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[3]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200
[4]   Feasibility and Finite Convergence Analysis for Accurate On-Line ν-Support Vector Machine [J].
Gu, Bin ;
Sheng, Victor S. .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2013, 24 (08) :1304-1315
[5]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[6]   Segmentation-Based Image Copy-Move Forgery Detection Scheme [J].
Li, Jian ;
Li, Xiaolong ;
Yang, Bin ;
Sun, Xingming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :507-518
[7]   Analysis of Delegable and proxy Provable Data Possession for Cloud Storage [J].
Ren, Yongjun ;
Shen, Jian ;
Wang, Jin ;
Fang, Liming .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :779-782
[8]   Compact Proofs of Retrievability [J].
Shacham, Hovav ;
Waters, Brent .
JOURNAL OF CRYPTOLOGY, 2013, 26 (03) :442-483
[9]   An Efficient Verifiably Encrypted Signature from Weil Pairing [J].
Shen, Jian ;
Zheng, Wenying ;
Wang, Jin ;
Zheng, Yuhui ;
Sun, Xingming ;
Lee, Sungyoung .
JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06) :947-952
[10]  
Shen ST, 2011, LECT NOTES COMPUT SC, V7043, P93, DOI 10.1007/978-3-642-25243-3_8