Skip to main content

Cloud Data Integrity Checking with Deduplication for Confidential Data Storage

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

Abstract

Data loss is a severe issue in cloud storage due to a number of confidential files stored on the cloud and thus, cloud servers have become the target of attackers. In this paper, we propose a cloud data integrity checking protocol with deduplication, which can guarantee the remote data integrity while achieving secure deduplication within the same framework. Another bonus of our construction is privacy preserving of the outsourced data, which is denoted as zero-knowledge data privacy, indicating that the third party auditor learns nothing about the stored data during the auditing process. In addition, we demonstrate the performance of our construction by developing a prototype of the protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: Draft NIST Working Definition of Cloud Computing, June 2009, http://csrc.nist.gov/groups/SNS/cloudcomputing/index.html

  2. Timothy, G., Peter, M.M.: The NIST definition of cloud computing, vol. NIST SP-800-145, September 2011

    Google Scholar 

  3. Frankie, L., Anthony, L., Ddl, D.: Evidence of advanced persistent threat: a case study of malware for political espionage. In: 6th International Conference on Malicious and Unwanted Software (2011)

    Google Scholar 

  4. Du, X., Xiao, Y., et al.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007). Elsevier

    Article  Google Scholar 

  5. Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wireless Commun. 8(3), 1223–1229 (2009)

    Article  Google Scholar 

  6. Du, X., Lin, F.: Maintaining differentiated coverage in heterogeneous sensor networks. EURASIP J. Wireless Commun. Netw. 5(4), 565–572 (2005)

    MATH  Google Scholar 

  7. Xiao, Y., Chen, H.H., Du, X., Guizani, M.: Stream-based cipher feedback mode in wireless error channel. IEEE Trans. Wireless Commun. 8(2), 662–666 (2009)

    Article  Google Scholar 

  8. Du, X., Zhang, M., et al.: Self-healing sensor networks with distributed decision making. Int. J. Sensor Netw. 2(5/6), 289–298 (2007)

    Article  Google Scholar 

  9. Yao, X., Han, X., Du, X., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)

    Article  Google Scholar 

  10. Cloud Security Alliance. Top threats to cloud computing (2010), http://www.cloudsecurityalliance.org

  11. Yu, Y., Zhang, Y., Ni, J., Au, M.H., Chen, L., Liu, H.: Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52, 77–85 (2015)

    Article  Google Scholar 

  12. Ateniese, G., Burns, R., et al.: Provable data possession at untrusted stores. In: Proceedings 14th ACM Conference Computer and Communications Security, New York, NY, USA (2007)

    Google Scholar 

  13. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). doi:10.1007/978-3-540-89255-7_7

    Chapter  Google Scholar 

  14. Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 4, 767–778 (2017)

    Article  Google Scholar 

  15. Yu, Y., Li, Y., Ni, J., Yang, G., Mu, Y., Susilo, W.: Comments on public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 11(3), 658–659 (2016)

    Article  Google Scholar 

  16. Li, Y., Yu, Y., Susilo, W., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure. Comput. (2016). doi:10.1109/TDSC.2017.2662216

  17. The digital universe decade - are you ready? International Data Corporation (2010), http://idcdocserv.com/925

  18. Pinkas, B., Shulman-Peleg, A., Halevi, S., Harnik, D.: Proofs of ownership in remote storage systems. Cryptology ePrint Archive, Report (2011), http://eprint.iacr.org/

  19. Di Pietro, R., Sorniotti, A.: Boosting efficiency and security in proof of ownership for deduplication. In: ASIACCS 2012, pp. 81–82 (2012)

    Google Scholar 

  20. Qingji, Z., Shouhuai, X.: Secure and efficient proof of storage with deduplication. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, pp. 1–12, New York, USA (2012)

    Google Scholar 

  21. Wang, C., Chow, S.S., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongyu Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Liu, H., Chen, L., Zeng, L. (2017). Cloud Data Integrity Checking with Deduplication for Confidential Data Storage. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics