Abstract
In public cloud, storage devices are not within the control of the enterprises. Data stored in the cloud server may be tampered or deleted illegally. Remote data integrity checking protocol enables the client to verify the integrity of data which is not stored in local. Aiming at the dynamic update operation in remote data integrity checking protocol, we propose a new authentication data structure named CBT, by deploying the tags of all data blocks to the nodes of a binary tree in a given order. Both theoretical analysis and experimental data show that, the number of nodes updated in CBT is 50 %, 69 % and 67 % compared with that of MHT in batch modification, insertion and deletion operations respectively; the memory of CBT is only two-thirds of MHT.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote integrity checking. In: 6th Working Conference on Integrity and Internal Control in Information Systems, pp. 1–11. Kluwer Academic Publishers (2004)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)
Ateniese, G., DiPietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of Secure Comm 2008, pp. 22–25. ACM (2008)
Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 213–222. ACM (2009)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the 14th European Conference on Research in Computer Security, pp. 355–370 (2009)
Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, pp. 237–248. ACM (2011)
Wang, J., Liu, S.: Dynamic provable data possession with batch-update verifiability. In: 2012 IEEE International Conference on Intelligent Control, Automatic Detection and High-End Equipment (ICADE), pp. 108–113. IEEE Press, New York (2012)
Li, C., Chen, Y., Tan, P., Yang, G.: An efficient provable data possession scheme with data dynamics. In: 2012 International Conference on Computer Science & Service System (CSSS), pp. 706–710. IEEE Press, New York (2012)
Zhu, Y., Ahn, G.J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. In: IEEE Transactions on Services Computing, vol. 6, no. 2, pp. 227–238. IEEE Press, New York (2013)
Acknowledgements
This work was partially supported by the Natural Science Foundation of China (No. 61272403), by the Fundamental Research Funds for the Central Universities (No. 10561201474).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Xu, H., Jiang, J., Xu, C. (2016). An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-49145-5_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49144-8
Online ISBN: 978-3-319-49145-5
eBook Packages: Computer ScienceComputer Science (R0)