Computer Science ›› 2017, Vol. 44 ›› Issue (3): 55-58.doi: 10.11896/j.issn.1002-137X.2017.03.014

Previous Articles     Next Articles

Hierarchical Remote Data Possession Checking Method

MA Hai-feng, YANG Jia-hai, YAO Nian-min and GUAN Ming-shan   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In cloud storage environment,the storage servers may not be fully trustworthy.How to verify the integrity of the cloud data with a lower overhead for users has become increasingly concerned problem.While many methods have been proposed,these methods in the verification of multiple files need to authenticate them one by one.So the computation and communication overhead is still expensive when the number of file is large.Aiming at this problem,a hierarchical remote data possession checking method was proposed.Combining with remote data possession checking method,the proposed method can provide more efficient and secure remote data integrity protection,and support dynamic data opera-tion.The security analysis and experimental evaluation results show that the proposed method is safe and reliable,and it can gain 45%~80% performance improvement with lower false negative rate.

Key words: Cloud storage,Data integrity,Provable data possession,Homomorphism tag,Hash tree

[1] ATENIESE G,BUMS R,CURTMOLA R,et al.Provable data possession at untrusted stores[C]∥14th ACM CCS.2007:598-609.
[2] JUELS A,BURTON S,KALISKI J.PORs:Proofs of Retrieva-bility for Large Files [C]∥Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07).Alexandria,Virginia,USA,USA:ACM Press,New York,NY,584-597.
[3] ATENIESE G,DI PIETRO R,MANCINI L V,et al.Scalable and efficient provable data possession[C]∥4th International Conference on Security and Privacy in Communication Networks.2008.
[4] ERWAY C,KUPCU A,PAPAMANTHOU C,et al.Dynamic provable data possession[C]∥16th ACM CCS.2009:213-222.
[5] SHACHAM H,WATERS B.Compact Proofs of Retrievability [C]∥Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’08).Melbourne,Australia,Berlin:Springer-Verlag,90-107.
[6] TAN S,JIA Y,HAN W H.Research and Development of Pro-vable Data Integrity in Cloud Storage [J].Chinese Journal of Computers,2015,38(1):164-177.(in Chinese) 谭霜,贾焰,韩伟红.云存储中的数据完整性证明研究及进展[J].计算机学报,2015,38(1):164-177.
[7] BOWERS K D,JUELS A,OPREA A.Proofs of Retrievability:Theory and Implementation[C]∥Proceeding(s) of ACM Workshop on Cloud Computing Security.Chicago,USA,2009:43-53.
[8] WANG C,WANG Q,REN K,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]∥29th IEEE INFOCOM.2010.
[9] CHEN L,ZHOU S,HUANG X,et al.Data dynamics for remote data possession checking in cloud storage[J].Computers and Electrical Engineering,2013,39:2413-2424.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!