Skip to main content

Enhanced Dynamic Remote Data Possession Checking Protocol with Unlimited Number of Verifications and Public Verifiability for Ensuring Cloud Data Integrity

  • Conference paper
  • First Online:
Advances in Data-Driven Computing and Intelligent Systems (ADCIS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 890))

  • 69 Accesses

Abstract

Today’s organizations and individuals generate large volumes of data. Since they lack resources, the organizations and individuals outsource their data to remote storages such as cloud storages. The user has no control over the data, since it is outsourced to a remotely administered cloud server. The outsourced data may be corrupted or deleted, intentionally or unintentionally. The user should have some means of ensuring the correctness of the outsourced data. In order to verify the correctness of the outsourced data, an Enhanced Dynamic Remote Data Possession Checking (EDRDPC) protocol is proposed in this paper. This EDRDPC protocol avoids the need for accessing the entire data file for each verification by randomly sampling the data blocks during the verification process. The proposed protocol also supports unlimited number of integrity verifications and dynamic data operations. This protocol also supports public verifiability in which any authorized third party auditor can perform the data integrity verification. The performance analysis shows the efficiency of the proposed protocol in terms of computation, communication and storage overheads. The security analysis highlights a notable advantage of the proposed protocol in detecting server misbehavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Regulation (EU) 2016/679 of the European Parliament and of the Council. EU General Data Protection Regulation (2016)

    Google Scholar 

  2. Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of 4th international conference on security and privacy in communication networking (SecureComm), pp 1–10

    Google Scholar 

  3. De Capitani S, di Vimercati S, Foresti SJ, Paraboschi S, Samarati P (2016) Efficient integrity checks for join queries in the cloud. J Comput Secur 24(3):347–378

    Article  Google Scholar 

  4. Sebe F, Domingo-Ferrer J, Martinez-Balleste A, Deswarte Y, Quisquater J-J (2008) Efficient remote data possession checking in critical information infrastructures. IEEE Trans Knowl Data Eng 20(8):1034–1038

    Article  Google Scholar 

  5. Erway C, Kupçu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference on computer and communication security (CCS), pp 213–222

    Google Scholar 

  6. Chen L (2013) Using algebraic signatures to check data possession in cloud storage. Futur Gener Comput Syst 29(7):1709–1715

    Article  Google Scholar 

  7. Litwin W, Schwarz T (2004) Algebraic signatures for scalable distributed data structures. In: Proceedings of 20th international conference on data engineering (ICDE), pp 412–423

    Google Scholar 

  8. Li X, Hao R (2019) A note on “Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme”. In: ICBDT2019, 28–30 Aug 2019, Jinan, China. Association for Computing Machinery, ACM

    Google Scholar 

  9. Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437

    Article  Google Scholar 

  10. Zhou E, Li Z (2014) An improved remote data possession checking protocol in cloud storage. In: Proceedings of 14th international conference on algorithms and architectures for parallel processing (ICA3PP), pp 611–617

    Google Scholar 

  11. Wang C, Wang Q, Ren K, Lou W (2009) Ensuring data storage security in cloud computing. In: Proceedings of IWQoS’09. IEEE, pp 1–9

    Google Scholar 

  12. Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232

    Article  Google Scholar 

  13. Wang C, Chow SSM, Wang Q, Ren K, Lou W (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 1–14

    Google Scholar 

  14. Wang C, Ren K, Lou W, Li J (2010) Toward publicly auditable secure cloud data storage services. IEEE Netw 19–24

    Google Scholar 

  15. Yu Y, Au MH, Mu Y, Tang S, Ren J, Susilo W, Dong L (2014) Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int J Inform Sec. Springer

    Google Scholar 

  16. Saxena R, Dey S (2016) Cloud audit: a data integrity verification approach for cloud computing. In: Twelfth international multi-conference on information processing-2016 (IMCIP-2016). Elsevier. Procedia Comput Sci 89:142–151

    Google Scholar 

  17. More S, Chaudhari S (2016) Third party public auditing scheme for cloud storage. In: 7th international conference on communication, computing and virtualization 2016. Elsevier. Procedia Comput Sci 79:69–76

    Google Scholar 

  18. Fan K, Liu M, Dong G et al (2018) Enhancing cloud storage security against a new relay attack with an efficient public auditing scheme. J Supercomput 1–27

    Google Scholar 

  19. Brindha K, Jeyanthi N (2017) A novel approach to secure cloud data storage and dynamic data auditing in a cloud. In: ICC’17, 22 Mar 2017, Cambridge, United Kingdom © 2017 ACM

    Google Scholar 

  20. Devi LY, Thilagavathy K (2018) Efficient privacy-preserving remote data possession checking protocol for critical information infrastructure. J Univ Comput Sci 24(5):603–621

    Google Scholar 

  21. Luo Y, Fu S, Xu M, Wang D (2014) Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage. China Commun 114–124

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Y. Pragathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pragathy, V.Y., Yamuna Devi, L. (2024). Enhanced Dynamic Remote Data Possession Checking Protocol with Unlimited Number of Verifications and Public Verifiability for Ensuring Cloud Data Integrity. In: Das, S., Saha, S., Coello, C.A.C., Rathore, H., Bansal, J.C. (eds) Advances in Data-Driven Computing and Intelligent Systems. ADCIS 2023. Lecture Notes in Networks and Systems, vol 890. Springer, Singapore. https://doi.org/10.1007/978-981-99-9531-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9531-8_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9530-1

  • Online ISBN: 978-981-99-9531-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics