Computer Science ›› 2019, Vol. 46 ›› Issue (3): 188-196.doi: 10.11896/j.issn.1002-137X.2019.03.028

• Information Security • Previous Articles     Next Articles

Cloud Big Data Integrity Verification Scheme Based on Multi-branch Tree

XIE Si-jiang1,2,JIA Bei1,WANG He2,XU Shi-cong1   

  1. (College of Computer Science,Xidian University,Xi’an 710071,China)1
    (Beijing Electronic Science and Technology Institution,Beijing 100070,China)2
  • Received:2018-02-08 Online:2019-03-15 Published:2019-03-22

Abstract: With the popularization of the Internet and mobile electronic devices,network storage will become the main way of storage in the future,and the cloud storage also will be the inevitable trend of network storage.How to ensure the integrity of users’ data on cloud storage environment becomes a major problem people concern.Aiming at the problem,this paper presented a cloud big data integrity verification scheme based on multi-branch tree.It realizes public verification with third party auditor and supports privacy-preserving by adding random masking,as well as,it uses a dyna-mic data structure which is multi-branch tree to accomplish dynamic operations.This paper also proposed a new algorithm to get information of data integrity verification from multi-branch tree.Test results show that the scheme can be efficiently applied in the cloud environment to verify data integrity with frequent update operations and multi-users.

Key words: Cloud storage, Data integrity, Provable data possession, Batch auditing, Multi-branch tree

CLC Number: 

  • TP309.2
[1] ATENIESE G,BURNS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:598-609.
[2] THANGAVEL M,VARALAKSHMI P,SINDHUJA R,et al.A survey on provable data possession in cloud storage[C]∥2016 Eighth International Conference on Advanced Computing (ICoAC).IEEE,2017:25-31.
[3] TAN S,JIA Y,HAN W H.Research and Development of Prova-ble Data Integrity in Cloud Storage[J].Chinese Journal of Comptuers,2015,38(1):164-177.(in Chinese)谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177.
[4] JUELS A,KALISKI JR B S.PORs:Proofs of retrievability for large files[C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM,2007:584-597.
[5] ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalableand efficient provable data possession[C]∥Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks.ACM,2008:9.
[6] WANG C,WANG Q,REN K,et al.Ensuring Data Storage Security in Cloud Computing[C]∥2009 17th International Workshop on Quality of Service.IEEE,2009:1-9.
[7] WANG Q,WANG C,LI J,et al.Enabling public verifiability and data dynamics for storage security in cloud computing[C]∥European Symposium on Research in Computer Security.Springer Berlin Heidelberg,2009:355-370.
[8] WANG Q,WANG C,REN K,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5):847-859.
[9] ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic Provable Data Possession[J].ACM Transactions on Information &System Security,2015,17(4):1-29.
[10] ERWAY C C,KP A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]∥Proceedings of the 16th ACM Conference on Computer and Communications Security.ACM,2009:213-222.
[11] WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥INFOCOM,2010 Proceedings IEEE.IEEE,2010:1-9.
[12] WANG C,CHOW S S M,WANG Q,et al.Privacy-preserving public auditing for secure cloud storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
[13] ZHANG Y,BLANTON M.Efficient dynamic provable possession of remote data via balanced update trees[C]∥Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security.ACM,2013:183-194.
[14] LIN C,LUO F,WANG H,et al.A provable data possessionscheme with data hierarchy in cloud[C]∥International Con-ference on Information Security and Cryptology.Springer International Publishing,2015:301-321.
[15] WANG H.Identity-based distributed provable data possession in multicloudstorage[J].IEEE Transactions on Service Computing,2015,8(2):328-340.
[16] ETEMAD M,KP A.Transparent,distributed,and replicated dynamic provable data possession[C]∥International Con-ference on Applied Cryptography and Network Security.Sprin-ger Berlin Heidelberg,2013:1-18.
[17] ZOU J,SUN Y,LI S.Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree[C]∥2016 International Con-ference on Identification,Information and Knowledge in the Internet of Things (IIKI).IEEE,2016:4-9.
[18] LI L,YANG Y,WU Z.FMR-PDP:Flexible multiple-replicaprovable data possession in cloud storage[C]∥2017 IEEE Symposium on Computers and Communications(ISCC).IEEE,2017:1115-1121.
[19] PENG S,ZHOU F,WANG Q,et al.Identity-Based PublicMulti-Replica Provable Data Possession[J].IEEE Access,2017,5:26990-27001
[20] RAJENDRAN A,BALASUBRAMANIAN V,MALA T.Integrity verification using Identity based Provable Data Possession in multi storage cloud[C]∥2017 International Conference on Computational Intelligence in Data Science (ICCIDS).IEEE,2017:1-4.
[21] HUANG D,WAN C.PDPMT:Provable data possession formultiple cloud tenants[C]∥2017 10th International Congress on Image and Signal Processing,BioMedical Engineering and Informatics (CISP-BMEI).IEEE,2017:1-6.
[1] QIAO Mao,QIN Ling. AB-ACCS Scheme for Revocation of Efficient Attributes in Cloud Storage Services [J]. Computer Science, 2019, 46(7): 96-101.
[2] WU Xiu-guo, LIU Cui. Data Replicas Distribution Transition Strategy in Cloud Storage System [J]. Computer Science, 2019, 46(10): 202-208.
[3] JIN Yu, CAI Chao, HE Heng and LI Peng. BTDA:Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party [J]. Computer Science, 2018, 45(3): 144-150.
[4] LIU Yan-tao, LIU Heng. Cloud Storage System Based on Network Coding [J]. Computer Science, 2018, 45(12): 293-298,312.
[5] PANG Xiao-qiong, REN Meng-qi, WANG Tian-qi, CHEN Wen-jun, NIE Meng-fei. Perfect Privacy-preserving Batch Provable Data Possession [J]. Computer Science, 2018, 45(11): 130-137,154.
[6] ZHANG Gui-peng, CHEN Ping-hua. Secure Data Deduplication Scheme Based on Merkle Hash Tree in HybridCloud Storage Environments [J]. Computer Science, 2018, 45(11): 187-192,203.
[7] TIAN Hui, CHEN Yu-xiang, HUANG Yong-feng and LU Jing. Research and Development of Auditing Techniques for Cloud Data Possession [J]. Computer Science, 2017, 44(6): 8-16, 50.
[8] XU Yun-yun, BAI Guang-wei, SHEN Hang and HUANG Zhong-ping. Virtual-user-based Public Auditing Integrity in Cloud Storage [J]. Computer Science, 2017, 44(5): 95-99.
[9] YANG Dong-ju and LI Qing. Scheduling Strategy of Hierarchical Storage about Replication in Cloud Storage [J]. Computer Science, 2017, 44(4): 85-89.
[10] MA Hai-feng, YANG Jia-hai, YAO Nian-min and GUAN Ming-shan. Hierarchical Remote Data Possession Checking Method [J]. Computer Science, 2017, 44(3): 55-58.
[11] JIN Yu and YAN Dong. Research on MapReduce-based Data Auditing Method for Cloud Storage [J]. Computer Science, 2017, 44(2): 195-201.
[12] WANG Hui-qing and ZHOU Lei. Multiple-replica Provable Data Possession Based on Paillier Encryption [J]. Computer Science, 2016, 43(Z6): 370-373, 409.
[13] LIU Huai-jin, CHEN Yong-hong, TIAN Hui, WANG Tian and CAI Yi-qiao. Integrity-checking Security Data Aggregation Protocol [J]. Computer Science, 2016, 43(Z6): 353-356.
[14] XIE Li-xia, BO Fu-kuan and ZHAO Bin-bin. Virtual Group Revocation Policy-based Cloud Storage Access Control Model [J]. Computer Science, 2016, 43(5): 122-126.
[15] HUANG Bao-hua, JIA Feng-wei and WANG Tian-jing. Database Access Control Policy Based on Attribute in Cloud Storage Platform [J]. Computer Science, 2016, 43(3): 167-173.
Full text



[1] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[2] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[3] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[4] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105, 130 .
[5] WANG Zhen-wu, LV Xiao-hua and HAN Xiao-hui. Survey of Terrain LOD Technology Based on Quadtree Segmentation[J]. Computer Science, 2018, 45(4): 34 -45 .
[6] WANG Shuai, LIU Juan, BI Yao-yao, CHEN Zhe, ZHENG Qun-hua and DUAN Hui-fang. Automatic Recognition of Breast Gland Based on Two-step Clustering and Random Forest[J]. Computer Science, 2018, 45(3): 247 -252 .
[7] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121, 136 .
[8] WU Shu, ZHOU An-min and ZUO Zheng. PDiOS:Private API Call Detection in iOS Applications[J]. Computer Science, 2018, 45(4): 163 -168 .
[9] LU Jia-wei, MA Jun, ZHANG Yuan-ming and XIAO Gang. Service Clustering Approach for Global Social Service Network[J]. Computer Science, 2018, 45(3): 204 -212 .
[10] LUO Xiao-yang, HUO Hong-tao, WANG Meng-si and CHEN Ya-fei. Passive Image-splicing Detection Based on Multi-residual Markov Model[J]. Computer Science, 2018, 45(4): 173 -177 .