Skip to main content

An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing

  • Conference paper
  • First Online:
  • 903 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10067))

Abstract

In public cloud, storage devices are not within the control of the enterprises. Data stored in the cloud server may be tampered or deleted illegally. Remote data integrity checking protocol enables the client to verify the integrity of data which is not stored in local. Aiming at the dynamic update operation in remote data integrity checking protocol, we propose a new authentication data structure named CBT, by deploying the tags of all data blocks to the nodes of a binary tree in a given order. Both theoretical analysis and experimental data show that, the number of nodes updated in CBT is 50 %, 69 % and 67 % compared with that of MHT in batch modification, insertion and deletion operations respectively; the memory of CBT is only two-thirds of MHT.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote integrity checking. In: 6th Working Conference on Integrity and Internal Control in Information Systems, pp. 1–11. Kluwer Academic Publishers (2004)

    Google Scholar 

  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)

    Google Scholar 

  3. Ateniese, G., DiPietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of Secure Comm 2008, pp. 22–25. ACM (2008)

    Google Scholar 

  4. Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 213–222. ACM (2009)

    Google Scholar 

  5. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security, pp. 355–370 (2009)

    Google Scholar 

  6. Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, pp. 237–248. ACM (2011)

    Google Scholar 

  7. Wang, J., Liu, S.: Dynamic provable data possession with batch-update verifiability. In: 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment (ICADE), pp. 108–113. IEEE Press, New York (2012)

    Google Scholar 

  8. Li, C., Chen, Y., Tan, P., Yang, G.: An efficient provable data possession scheme with data dynamics. In: 2012 International Conference on Computer Science & Service System (CSSS), pp. 706–710. IEEE Press, New York (2012)

    Google Scholar 

  9. Zhu, Y., Ahn, G.J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. In: IEEE Transactions on Services Computing, vol. 6, no. 2, pp. 227–238. IEEE Press, New York (2013)

    Google Scholar 

Download references

Acknowledgements

This work was partially supported by the Natural Science Foundation of China (No. 61272403), by the Fundamental Research Funds for the Central Universities (No. 10561201474).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Xu, H., Jiang, J., Xu, C. (2016). An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49145-5_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49144-8

  • Online ISBN: 978-3-319-49145-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics