Computer Science ›› 2019, Vol. 46 ›› Issue (3): 188-196.doi: 10.11896/j.issn.1002-137X.2019.03.028

• Information Security • Previous Articles     Next Articles

Cloud Big Data Integrity Verification Scheme Based on Multi-branch Tree

XIE Si-jiang1,2,JIA Bei1,WANG He2,XU Shi-cong1   

  1. (College of Computer Science,Xidian University,Xi’an 710071,China)1
    (Beijing Electronic Science and Technology Institution,Beijing 100070,China)2
  • Received:2018-02-08 Online:2019-03-15 Published:2019-03-22

Abstract: With the popularization of the Internet and mobile electronic devices,network storage will become the main way of storage in the future,and the cloud storage also will be the inevitable trend of network storage.How to ensure the integrity of users’ data on cloud storage environment becomes a major problem people concern.Aiming at the problem,this paper presented a cloud big data integrity verification scheme based on multi-branch tree.It realizes public verification with third party auditor and supports privacy-preserving by adding random masking,as well as,it uses a dyna-mic data structure which is multi-branch tree to accomplish dynamic operations.This paper also proposed a new algorithm to get information of data integrity verification from multi-branch tree.Test results show that the scheme can be efficiently applied in the cloud environment to verify data integrity with frequent update operations and multi-users.

Key words: Batch auditing, Cloud storage, Data integrity, Multi-branch tree, Provable data possession

CLC Number: 

  • TP309.2
[1]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:598-609.
[2]THANGAVEL M,VARALAKSHMI P,SINDHUJA R,et al.A survey on provable data possession in cloud storage[C]∥2016 Eighth International Conference on Advanced Computing (ICoAC).IEEE,2017:25-31.
[3]TAN S,JIA Y,HAN W H.Research and Development of Prova-
ble Data Integrity in Cloud Storage[J].Chinese Journal of Comptuers,2015,38(1):164-177.(in Chinese)
谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177.
[4]JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597.
[5]ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalable
and efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:9.
[6]WANG C,WANG Q,REN K,et al.Ensuring Data Storage Security in Cloud Computing[C]∥2009 17th International Workshop on Quality of Service.IEEE,2009:1-9.
[7]WANG Q,WANG C,LI J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]∥European Symposium on Research in Computer Security.Springer Berlin Heidelberg,2009:355-370.
[8]WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859.
[9]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession[J].ACM Transactions on Information &System Security,2015,17(4):1-29.
[10]ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222.
[11]WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9.
[12]WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
[13]ZHANG Y,BLANTON M.Efficient dynamic provable possession of remote data via balanced update trees[C]∥Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:183-194.
[14]LIN C,LUO F,WANG H,et al.A provable data possession
scheme with data hierarchy in cloud[C]∥International Con-ference on Information Security and Cryptology.Springer International Publishing,2015:301-321.
[15]WANG H.Identity-based distributed provable data possession in multicloudstorage[J].IEEE Transactions on Service Computing,2015,8(2):328-340.
[16]ETEMAD M,KP A.Transparent,distributed,and replicated dynamic provable data possession[C]∥International Con-ference on Applied Cryptography and Network Security.Sprin-ger Berlin Heidelberg,2013:1-18.
[17]ZOU J,SUN Y,LI S.Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree[C]∥2016 International Con-ference on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2016:4-9.
[18]LI L,YANG Y,WU Z.FMR-PDP:Flexible multiple-replica
provable data possession in cloud storage[C]∥2017 IEEE Symposium on Computers and Communications(ISCC).IEEE,2017:1115-1121.
[19]PENG S,ZHOU F,WANG Q,et al.Identity-Based Public
Multi-Replica Provable Data Possession[J].IEEE Access,2017,5:26990-27001
[20]RAJENDRAN A,BALASUBRAMANIAN V,MALA T.Integrity verification using Identity based Provable Data Possession in multi storage cloud[C]∥2017 International Conference on Computational Intelligence in Data Science (ICCIDS).IEEE,2017:1-4.
[21]HUANG D,WAN C.PDPMT:Provable data possession for
multiple cloud tenants[C]∥2017 10th International Congress on Image and Signal Processing,BioMedical Engineering and Informatics (CISP-BMEI).IEEE,2017:1-6.
[1] XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115.
[2] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[3] CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281.
[4] ZHANG Xi, WANG Jian. Public Integrity Auditing for Shared Data in Cloud Supporting User Identity Tracking [J]. Computer Science, 2020, 47(6): 303-309.
[5] LI Shu-quan,LIU Lei,ZHU Da-yong,XIONG Chao,LI Rui. Protocol of Dynamic Provable Data Integrity for Cloud Storage [J]. Computer Science, 2020, 47(2): 256-261.
[6] BAI Li-fang, ZHU Yue-fei, LU Bin. Research and Development of Data Storage Security Audit in Cloud [J]. Computer Science, 2020, 47(10): 290-300.
[7] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
[8] GU Chen-yang, FU Wei, LIU Jin-long, SUN Gang. Survey of ORAM Research in Cloud Storage [J]. Computer Science, 2019, 46(11A): 341-347.
[9] WU Xiu-guo, LIU Cui. Data Replicas Distribution Transition Strategy in Cloud Storage System [J]. Computer Science, 2019, 46(10): 202-208.
[10] JIN Yu, CAI Chao, HE Heng and LI Peng. BTDA:Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party [J]. Computer Science, 2018, 45(3): 144-150.
[11] LIU Yan-tao, LIU Heng. Cloud Storage System Based on Network Coding [J]. Computer Science, 2018, 45(12): 293-298.
[12] PANG Xiao-qiong, REN Meng-qi, WANG Tian-qi, CHEN Wen-jun, NIE Meng-fei. Perfect Privacy-preserving Batch Provable Data Possession [J]. Computer Science, 2018, 45(11): 130-137.
[13] ZHANG Gui-peng, CHEN Ping-hua. Secure Data Deduplication Scheme Based on Merkle Hash Tree in HybridCloud Storage Environments [J]. Computer Science, 2018, 45(11): 187-192.
[14] TIAN Hui, CHEN Yu-xiang, HUANG Yong-feng and LU Jing. Research and Development of Auditing Techniques for Cloud Data Possession [J]. Computer Science, 2017, 44(6): 8-16.
[15] XU Yun-yun, BAI Guang-wei, SHEN Hang and HUANG Zhong-ping. Virtual-user-based Public Auditing Integrity in Cloud Storage [J]. Computer Science, 2017, 44(5): 95-99.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!