Advertisement

Two-Level Verification of Data Integrity for Data Storage in Cloud Computing

  • Guangwei Xu
  • Chunlin Chen
  • Hongya Wang
  • Zhuping Zang
  • Mugen Pang
  • Ping Jiang
Part of the Communications in Computer and Information Science book series (CCIS, volume 143)

Abstract

Data storage in cloud computing can save capital expenditure and relive burden of storage management for users. As the lose or corruption of files stored may happen, many researchers focus on the verification of data integrity. However, massive users often bring large numbers of verifying tasks for the auditor. Moreover, users also need to pay extra fee for these verifying tasks beyond storage fee. Therefore, we propose a two-level verification of data integrity to alleviate these problems. The key idea is to routinely verify the data integrity by users and arbitrate the challenge between the user and cloud provider by the auditor according to the MACs and ϕ values. The extensive performance simulations show that the proposed scheme obviously decreases auditor’s verifying tasks and the ratio of wrong arbitration.

Keywords

Data storage integrity verification challenge arbitration 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28 (February 2009)Google Scholar
  2. 2.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)Google Scholar
  3. 3.
    Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)Google Scholar
  4. 4.
    Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudikd, G.: Scalable and efficient provable data possession. Technical Report 2008/114, Cryptology ePrint Archive (March 2007)Google Scholar
  5. 5.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In: Proceedings of IEEE INFOCOM (March 2010)Google Scholar
  6. 6.
    Shi, J., Zhang, R., Liu, Y., Zhang, Y.: PriSense: Privacy- Preserving Data Aggregation in People-Centric Urban Sensing Systems. In: Proceedings of IEEE INFOCOM (March 2010)Google Scholar
  7. 7.
    Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable Grid Computing. In: Proceedings of the 24th IEEE International Conference on Distributed Computing Systems, pp. 4–11 (March 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Guangwei Xu
    • 1
  • Chunlin Chen
    • 1
  • Hongya Wang
    • 1
  • Zhuping Zang
    • 1
  • Mugen Pang
    • 1
  • Ping Jiang
    • 2
  1. 1.School of Computer Science and TechnologyDonghua UniversityShanghaiChina
  2. 2.The Faculty of Finance and AccountingShanghai Business SchoolShanghaiChina

Personalised recommendations