Abstract
Today’s organizations and individuals generate large volumes of data. Since they lack resources, the organizations and individuals outsource their data to remote storages such as cloud storages. The user has no control over the data, since it is outsourced to a remotely administered cloud server. The outsourced data may be corrupted or deleted, intentionally or unintentionally. The user should have some means of ensuring the correctness of the outsourced data. In order to verify the correctness of the outsourced data, an Enhanced Dynamic Remote Data Possession Checking (EDRDPC) protocol is proposed in this paper. This EDRDPC protocol avoids the need for accessing the entire data file for each verification by randomly sampling the data blocks during the verification process. The proposed protocol also supports unlimited number of integrity verifications and dynamic data operations. This protocol also supports public verifiability in which any authorized third party auditor can perform the data integrity verification. The performance analysis shows the efficiency of the proposed protocol in terms of computation, communication and storage overheads. The security analysis highlights a notable advantage of the proposed protocol in detecting server misbehavior.
References
Regulation (EU) 2016/679 of the European Parliament and of the Council. EU General Data Protection Regulation (2016)
Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of 4th international conference on security and privacy in communication networking (SecureComm), pp 1–10
De Capitani S, di Vimercati S, Foresti SJ, Paraboschi S, Samarati P (2016) Efficient integrity checks for join queries in the cloud. J Comput Secur 24(3):347–378
Sebe F, Domingo-Ferrer J, Martinez-Balleste A, Deswarte Y, Quisquater J-J (2008) Efficient remote data possession checking in critical information infrastructures. IEEE Trans Knowl Data Eng 20(8):1034–1038
Erway C, Kupçu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference on computer and communication security (CCS), pp 213–222
Chen L (2013) Using algebraic signatures to check data possession in cloud storage. Futur Gener Comput Syst 29(7):1709–1715
Litwin W, Schwarz T (2004) Algebraic signatures for scalable distributed data structures. In: Proceedings of 20th international conference on data engineering (ICDE), pp 412–423
Li X, Hao R (2019) A note on “Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme”. In: ICBDT2019, 28–30 Aug 2019, Jinan, China. Association for Computing Machinery, ACM
Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437
Zhou E, Li Z (2014) An improved remote data possession checking protocol in cloud storage. In: Proceedings of 14th international conference on algorithms and architectures for parallel processing (ICA3PP), pp 611–617
Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data storage security in cloud computing. In: Proceedings of IWQoS’09. IEEE, pp 1–9
Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232
Wang C, Chow SSM, Wang Q, Ren K, Lou W (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 1–14
Wang C, Ren K, Lou W, Li J (2010) Toward publicly auditable secure cloud data storage services. IEEE Netw 19–24
Yu Y, Au MH, Mu Y, Tang S, Ren J, Susilo W, Dong L (2014) Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int J Inform Sec. Springer
Saxena R, Dey S (2016) Cloud audit: a data integrity verification approach for cloud computing. In: Twelfth international multi-conference on information processing-2016 (IMCIP-2016). Elsevier. Procedia Comput Sci 89:142–151
More S, Chaudhari S (2016) Third party public auditing scheme for cloud storage. In: 7th international conference on communication, computing and virtualization 2016. Elsevier. Procedia Comput Sci 79:69–76
Fan K, Liu M, Dong G et al (2018) Enhancing cloud storage security against a new relay attack with an efficient public auditing scheme. J Supercomput 1–27
Brindha K, Jeyanthi N (2017) A novel approach to secure cloud data storage and dynamic data auditing in a cloud. In: ICC’17, 22 Mar 2017, Cambridge, United Kingdom © 2017 ACM
Devi LY, Thilagavathy K (2018) Efficient privacy-preserving remote data possession checking protocol for critical information infrastructure. J Univ Comput Sci 24(5):603–621
Luo Y, Fu S, Xu M, Wang D (2014) Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage. China Commun 114–124
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pragathy, V.Y., Yamuna Devi, L. (2024). Enhanced Dynamic Remote Data Possession Checking Protocol with Unlimited Number of Verifications and Public Verifiability for Ensuring Cloud Data Integrity. In: Das, S., Saha, S., Coello, C.A.C., Rathore, H., Bansal, J.C. (eds) Advances in Data-Driven Computing and Intelligent Systems. ADCIS 2023. Lecture Notes in Networks and Systems, vol 890. Springer, Singapore. https://doi.org/10.1007/978-981-99-9531-8_15
Download citation
DOI: https://doi.org/10.1007/978-981-99-9531-8_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9530-1
Online ISBN: 978-981-99-9531-8
eBook Packages: EngineeringEngineering (R0)