Abstract
To check the remote data integrity in cloud computing, we have proposed an efficient and full data dynamic provable data possession (PDP) scheme that uses a SN (serial number)-BN (block number) table to support data block update. In this article, we first analyze and test its performance in detail. The result shows that our scheme is efficient with low computation, storage, and communication costs. Then, we discuss how to extend the dynamic scheme to support other features, including public auditability, privacy preservation, fairness, and multiple-replica checking. After being extended, a comprehensive PDP scheme that has high efficiency and satisfies all main requirements is provided.
Similar content being viewed by others
References
Deswarte Y, Quisquater J J, Saidane A. Remote integrity checking [C]//Proceedings of IICIS’03. Berlin: Springer-Verlag, 2003: 1–11.
Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proceedings of ACM-CCS’07. New York: ACM Press, 2007: 598–609.
Juels A, Kaliski B S. Pors: Proofs of retrievability for large files [C]//Proceedings of ACM-CCS’07. New York: ACM Press, 2007: 584–597.
Ateniese G, Di Pietro R, Mancini L V, et al. Scalable and efficient provable data possession [C]//Proceedings of Secure Comm’08. New York: ACM Press, 2008: 1–10.
Wang Qian, Wang Cong, Ren Kui, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transaction on Parallel and Distributed Systems, 2011, 22(5): 847–859.
Hao Zhuo, Zhong Sheng, Yu Nenghai. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability [J]. IEEE Transaction on Knowledge and Data Engineering, 2011, 23(9): 1432–1437.
Luo Wenjun, Bai Guojing. Ensuring the data integrity in cloud data storage [C]//Proceedings of CCIS’11. Buffalo: IEEE Computer Society, 2011: 240–243.
Wang Cong, Wang Qian, Ren Kui, et al. Privacy-preserving public auditing for data storage security in cloud computing [C]//Proceedings of IEEE INFOCOM’10. Buffalo: IEEE Computer Society, 2010: 1–9.
Hao Zhuo, Yu Nenghai. A multiple-replica remote data possession checking protocol with public verifiability [C]// Proceedings of ISDPE’10. Buffalo: IEEE Computer Society, 2010: 84–89.
Zhu Yan, Wang Huaixi, Hu Zexing, et al. Dynamic audit services for integrity verification of outsourced storage in clouds [C]//Proceedings of SAC’11. New York: ACM Press, 2011: 1550–1557.
Zheng Qingji, Xu Shouhuai. Fair and dynamic proofs of retrievability [C]//Proceedings of CODASPY’11. New York: ACM Press, 2011: 237–248.
Liu Feifei, Gu Dawu, Lu Haining. An improved dynamic provable data possession model [C]//Proceedings of CCIS’11. Buffalo: IEEE Computer Society, 2011: 290–295.
Curtmola R, Khan O, Burns R, et al. MR-PDP: Multiple-replica provable data possession [C]//Proceedings of IEEE ICDCS’08. Buffalo: IEEE Computer Society, 2008: 411–420.
Barsoum A F, Anwar H M. Provable possession and Replication of data over cloud servers [EB/OL]. [2011-06-12]. http://www.cacr.math.uwaterloo.ca/techreport/2010/cacr2010-32.pdf.
Sebe F, Domingo-Ferrer J, Martinez-Balleste A, et al. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Transaction on Knowledge and Data Engineering, 2008, 22(5): 1034–1038.
Li Chaoling, Chen Yue, Tan Pengxu, et al. An efficient provable data possession scheme with data dynamics [C]// Proceedings of CSSS’12. Buffalo: IEEE Computer Society, 2012: 706–710.
Bellare M, Guérin R, Rogaway P. XOR MACs: New methods for message authentication using finite pseudorandom functions [C]//Proceedings of CRYPTO’95. Berlin: Springer-Verlag, 1995: 15–28.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Basic “863” Research Program of China (2012CB315901)
Biography: LI Chaoling, male, Ph.D. candidate, research direction: trusted computing and cloud computing.
Rights and permissions
About this article
Cite this article
Li, C., Chen, Y., Tan, P. et al. Towards comprehensive provable data possession in cloud computing. Wuhan Univ. J. Nat. Sci. 18, 265–271 (2013). https://doi.org/10.1007/s11859-013-0926-8
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-013-0926-8