Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 370-373.doi: 10.11896/j.issn.1002-137X.2016.6A.088

Previous Articles     Next Articles

Multiple-replica Provable Data Possession Based on Paillier Encryption

WANG Hui-qing and ZHOU Lei   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In cloud storage service,the user data are stored in untrusted cloud storage server and faced with security threat.In order to check whether all the file replicas are stored by the CSP intactly,a multiple-replica provable data possession scheme based on Paillier encryption and supporting the dynamic operation of data replica was proposed,namely the DMR-PDP scheme.To realize multiple-replica check,the file blocks are stored in the cloud server in the form of co-pies,and differentiable replicas are generated by using Paillier encryption system to encrypt the concatenation of the serial numbers of replicas and the file.The verifying tags are generated by BLS signature,which can batch checking of all replicas.The information of file identification and block position are added into the block tags to prevent both of the replacing and replay attacks from the CSP.The security analysis and simulation results show that the scheme is better than other literature methods in terms of security,communications and computational overhead,greatly improves the efficiency of file storage and validation,and reduces the computational overhead.

Key words: Cloud computing,Cloud server provider(CSP),Multiple-replica,Dynamic multiple-replica provable data possession(DMR-PDP),Paillier encryption system

[1] 陈兰香.一种基于同态Hash的数据持有性证明方法.电子与信息学[J].2011,3(9):2200-2204
[2] Ateniese G,Berns R,Cutmola R,et al.Provable Data Possession at Untrusted Stores[C]∥Proc of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:598-609
[3] Ateniese G,Pietro ,R D,Mancini L V,et al.Scalable and Efficient Provable Data Possessin[C]∥Proc of the 4th International Conference on Security and Privacy in Communication Netowrks Istanbul.Turkey:ACM,2008:1-10
[4] Erway C,Kupcu A,Papamanthou C,et al.Dynamic ProvableData Possession[C]∥Proc of the16thACM Conferenceon Computer andCommunications Security.Chicago,Illinois,USA:ACM,2009:213-222
[5] Wang Q,Wang C,Li J,et al.Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing[C]∥Proc of the14thEuropean Conferenceon on Research in Computer Security.Heidelberg,Berlin,2009:355-370
[6] Hao Z,Zhong S,Yu N.A Privacy-preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability[J].IEEE Transactions on Knowledge and Data Engineering,2011,23(9):1432
[7] Curtmola R,Khan O,Burns R,et al.Multiple-Replica Provable Data Possession [C]∥28thIEEE ICDCS.2008:411-420
[8] Barsoum A F,Hasan M A.On Verifying Dynamic Multiple Data Copies over Cloud Servers [R].Cryptology ePrint Archive,2011:447
[9] Damgard I,Ren K,Lou W,et al.Toward Publicly Auditable Secure Cloud Data Storage Services[J].IEEE Network,2011,4:19-24
[10] Wang C,Jurki M.A Simplification and some Application of Paillier’s Probabilistic Public Key System [C]∥4thInternation Workshop on Practice and Theory in Public Key Cryptosystems.2001:13-15
[11] 于洋洋,虞慧群,范贵生.一种云存储数据完整性验证方法[J].华东理工大学学报(自然科学版),2013,9(2):211-216
[12] 胡德敏,余星.一种基于同态标签的动态云存储数据完整性验证方法[J].计算机应用研究,2014,1(5):1362-1365
[13] Chen L,Guo G.An Efficient Remote Data Possession Checking in Cloud Storage[J].International Journal of Digital Content Technology and its Applications,2011,5(4):43-50

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!