Advertisement

The Journal of Supercomputing

, Volume 75, Issue 1, pp 92–108 | Cite as

A method for achieving provable data integrity in cloud computing

  • Aiping LiEmail author
  • Shuang Tan
  • Yan Jia
Article

Abstract

By storing data files in the cloud, users can make use of cloud computing techniques, thereby reducing hardware investment and simplifying data management. However, ensuring data integrity when using unreliable service providers is a problem. In this paper, we propose a novel method for provable data integrity (PDI) aimed at clients with data stored in untrusted servers in cloud computing environments. An advantage of this model is the low client cost since a constant amount of metadata is generated. Based on a bilinear group, we propose a simple, efficient audit service for public verification of untrusted outsourced storage. Compared with existing PDI methods, we aim to resolve this issue by considering the cost of generating verification metadata at the client. Furthermore, our method supports data dynamics and public verifiability. Finally, the results of extensive experiments conducted to evaluate the performance of our method demonstrate that our method achieves high efficiency.

Keywords

Cloud security Provable data integrity Third party auditor Provable data possession Proof of retrievability 

Notes

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61472433) and the National Basic Research Program of China (973 Program, No. 2013CB329604).

References

  1. 1.
    Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur (TISSEC) 14(1):12CrossRefGoogle Scholar
  2. 2.
    Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, pp 598–609Google Scholar
  3. 3.
    Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: Advances in cryptology—ASIACRYPT’01. Springer, New York, pp 514–532Google Scholar
  4. 4.
    Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Dodis Y, Vadhan S, Wichs D (2009) Proofs of retrievability via hardness amplification. In: Theory of cryptography. Springer, New York, pp 109–127Google Scholar
  6. 6.
    Erway C, Küpçü A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of the 16th ACM conference on computer and communications security (CCS’09). ACM, New York, pp 213–222. doi: 10.1145/1653662.1653688
  7. 7.
    Grobauer B, Walloschek T, Stöcker E (2011) Understanding cloud computing vulnerabilities. Secur Priv IEEE 9(2):50–57CrossRefGoogle Scholar
  8. 8.
    Juels A, Kaliski BS Jr (2007) Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, pp 584–597Google Scholar
  9. 9.
    Mell P, Grance T (2009) The NIST definition of cloud computing. Natl Inst Stand Technol 53(6):50Google Scholar
  10. 10.
    Shacham H, Waters B (2008) Compact proofs of retrievability. In: Advances in cryptology—ASIACRYPT’08. Springer, New York, pp 90–107Google Scholar
  11. 11.
    Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Shuang T, Lin T, Xiaoling L, Yan J (2014) An efficient method for checking the integrity of data in the cloud. Commun China 11(9):68–81CrossRefGoogle Scholar
  13. 13.
    Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 proceedings IEEE. IEEE, pp 1–9Google Scholar
  14. 14.
    Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. In: Computer security—ESORICS’09. Springer, New York, pp 355–370Google Scholar
  15. 15.
    Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRefGoogle Scholar
  16. 16.
    Zhu Y, Hu H, Ahn GJ, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244CrossRefGoogle Scholar
  17. 17.
    Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H (2011) Zero-knowledge proofs of retrievability. Sci China Inf Sci 54(8):1608–1617MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.Computer SchoolNational University of Defense TechnologyChangshaChina

Personalised recommendations