Advertisement

An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics

  • Zuojie Deng
  • Shuhong Chen
  • Xiaolan Tan
  • Dan Song
  • Fan Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11342)

Abstract

A user can use a provable multi-copy data possession schemes (PMDP) to ascertain whether its copies in cloud storage are kept securely. Unfortunately, all existing PMDP are not secure and efficient. To address this problem, we propose an efficient provable multi-copy data possession scheme with data dynamics (EPMDP). We design a kind of authenticated 2-3 tree with arrays in ordered leaves (A2-3AOL) and use the A2-3AOL and a kind of RSA tag to construct EPMDP. The analysis results of the security and performance show that EPMDP has strong security and good performance.

Keywords

Cloud storage Data dynamics Multi-copy Provable data possession 

Notes

Acknowledgement

The research was partially funded by the Doctoral Program of Hunan Institute of Engineering (Grant No. 17RC028), the Scientific Research Fund of Hunan Provincial education Department (Grant No. 16A049), the Natural Science Foundation of Hunan Province (Grant No. 2016JJ3051, 2016JJ6031) and the National Natural Science Foundation of China (Grant No. 61502163).

References

  1. 1.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., et al.: Above the clouds: a berkeley view of cloud computing. Technical report UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009)Google Scholar
  2. 2.
    Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: Multiple-replica provable data possession. In: Proceedings of the 28th International Conference on Distributed Computing Systems. ICDCS 2008, pp. 411–420. IEEE Press, New York (2008)Google Scholar
  3. 3.
    Barsoum, A.F., Hasan, M.A.: Provable possession and replication of data over cloud servers. Report, vol. 32, Centre For Applied Cryptographic Research (CACR), University of Waterloo (2012)Google Scholar
  4. 4.
    Barsoum, A.F., Hasan, M.A.: Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans. Inf. Forensics Secur. 10(3), 485–497 (2017)CrossRefGoogle Scholar
  5. 5.
    Agrawal, H., Sharma, M.: Implementation and analysis of various symmetric cryptosystems. Indian J. Sci. Technol. 3(12), 1173–1176 (2010)Google Scholar
  6. 6.
    Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. CCS 2007, pp. 598–609. ACM Press, New York (2007)Google Scholar
  7. 7.
    Ateniese, G., et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 1–34 (2011)CrossRefGoogle Scholar
  8. 8.
    Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security. CCSW 2009, pp. 43–54. ACM, New York (2009)Google Scholar
  9. 9.
    Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. CCS 2009, pp. 213–222. ACM Press, New York (2009)Google Scholar
  10. 10.
    Gallagher, P., Kerry, C.: FIPS pub 186–4: digital signature standard (DSS), National Institute of Standards and Technology (NIST) (2013)Google Scholar
  11. 11.
    Goldreich, O.: Foundations of Cryptography: Basic Applications. Cambridge University Press, Cambridge (2004)CrossRefGoogle Scholar
  12. 12.
    He, D., Kumar, N., Zeadally, S., et al.: Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Trans. Ind. Inf. 14(3), 1232–1241 (2018)CrossRefGoogle Scholar
  13. 13.
    Juels, A., Kaliski, B.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. CCS 2007, pp. 584–597. ACM Press, New York (2007)Google Scholar
  14. 14.
    Manasa, A., Saritha, S.J.: An evidence multi-copy dynamic data possession in multi cloud computing system. In: International Conference on Communication and Electronics Systems, pp. 1–4. IEEE Press, New York (2017)Google Scholar
  15. 15.
    Needham, R.M.: Denial of service. In: Proceedings of the 1st ACM Conference on Computer and Communications Security. CCS 1993, pp. 151–153. ACM Press (1993)Google Scholar
  16. 16.
    Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Shen, S.-T., Tzeng, W.-G.: Delegable provable data possession for remote data in the clouds. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 93–111. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-25243-3_8CrossRefGoogle Scholar
  18. 18.
    Wang, C., Chow, S.M., Wang, Q., Ren, K., Lou, W.J.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Wang, C., Wang, Q., Ren, K., Lou, W.J.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 29th Conference on Information Communications. INFOCOM 2010, pp. 525–533. IEEE Press, Piscataway (2010)Google Scholar
  20. 20.
    Wang, F., Xu, L., Wang, H., et al.: Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69, 521–533 (2018)CrossRefGoogle Scholar
  21. 21.
    Wang, H., Zhang, Y.: On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 25(1), 264–267 (2014)CrossRefGoogle Scholar
  22. 22.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-04444-1_22CrossRefGoogle Scholar
  23. 23.
    Wang, Q., Wang, C., Ren, K., Lou, W.J., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Zuojie Deng
    • 1
  • Shuhong Chen
    • 2
  • Xiaolan Tan
    • 1
  • Dan Song
    • 1
  • Fan Wu
    • 1
  1. 1.School of Computer and CommunicationHunan Institute of EngineeringXiangtanChina
  2. 2.School of Computer Science and TechnologyGuangzhou UniversityGuangzhouChina

Personalised recommendations