Skip to main content
Log in

Distributed data possession provable in cloud

  • Published:
Distributed and Parallel Databases Aims and scope Submit manuscript

Abstract

Nowadays, many organizations outsource their data to remote cloud servers. In order to increase the availability of data, the data owners store their data replicas on multiple servers. In this paper, we propose a dynamic replicated data possession checking scheme that has three characteristics: the data owner uses fully homomorphic encryption algorithm to generate multiple copies; the scheme supports data block dynamic operation; our scheme can identify the corrupted data block. Finally, security analysis and experimental results show that our scheme can resist forge, replace and replay attack, and perform better than some other related scheme published recently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Jula, A., Sundararajan, E., Othman, Z.: Cloud computing service composition: a systematic literature review article. Expert Syst. Appl. 41(8), 3809–3824 (2014)

    Article  Google Scholar 

  2. Wang, W., Zeng, G., Yao, J.: Cloud-DLS: dynamic trusted scheduling for cloud computing original research article. Expert Syst. Appl. 39(3), 2319–2321 (2012)

    Google Scholar 

  3. Lin, Y., Chang, P.: Maintenance reliability estimation for a cloud computing network with nodes failure. Expert Syst. Appl. 38(11), 14185–14189 (2011)

    Google Scholar 

  4. Ateniese, G., Burns, R., Curtmola, R., et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, 1–34 (2011)

    Article  Google Scholar 

  5. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM CCS 2007, pp. 598–609 (2007)

  6. Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., et al.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)

    Article  Google Scholar 

  7. Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: HOTOS’07: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems, Berkeley, pp. 1–6 (2007)

  8. Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. In: Cryptology ePrint Archive, Report 2008/186 (2008)

  9. Zeng, K.: Publicly verifiable remote data integrity. In: Proceedings of the 10th International Conference on Information and Communications Security, Ser. ICICS ’08, pp. 419–434. Springer, Berlin (2008)

  10. Juels, A., Burton, J., Kaliski, S.: Pors: proofs of retrievability for large files. In: ACM CCS 2007, pp. 584–597 (2007)

  11. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference Theory and Application of Cryptology and Information Security, pp. 90–107 (2008)

  12. Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings 16th ACM Conference on Computer and Communications Security (CCS). New York, pp. 187–198 (2009)

  13. Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceedings of the ACM Workshop Cloud Computing Security (CCSW), pp. 43–54 (2009)

  14. Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Proceedings of the 6th Theory Cryptography Conference (TCC), pp. 109–127 (2009)

  15. Curtmola, R., Khan, O., Burns, R.: Robust remote data checking. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, pp. 63–68 (2008)

  16. Juels, A., Kaliski, B.S., Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 584–597 (2007)

  17. Wang, C., Ren, K., Lou, W., et al.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010). doi:10.1109/MNET.2010.5510914

    Article  Google Scholar 

  18. Ateniese, G., Pietro, R.D., Mancin, L.V., et al.: Scalable and efficient provable data possession. In: SecureComm 08: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, New York, pp. 1–10 (2008)

  19. Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. In: Cryptology ePrint Archive, Report 2008/186 (2008)

  20. Erway, C., Kupcu, A., Papamanthou, C., et al.: Dynamic provable data possession. In CCS 09: Proceedings of the 16th ACM Conference on Computer and Communications Security, New York, pp. 213–222 (2009)

  21. Wang, Q., Wang, C., Li, J., Ren, K., et al.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: ESORICS09: Proceedings of the 14th European Conference on Research in Computer Security. Berlin, pp. 355–370 (2009)

  22. Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. In: IEEE Transactions on Knowledge and Data Engineering, PrePrints, p. 99 (2011)

  23. Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: 28th IEEE ICDCS, pp. 411–420 (2008)

  24. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) Advances in Cryptology-ASIACRYPT 2008, vol. 5350, pp. 90–107. Springer, Berlin (2008)

  25. Barsoum, A.F., Hasan, M.A.: On verifying dynamic multiple data copies over cloud servers. In: Cryptology ePrint Archive, Report 2011/447 (2011). http://eprint.iacr.org/

  26. Raghul, M., Sanjay, M., Mark, L.: Efficient integrity verification of replicated data in cloud using homomorphic encryption. Distrib. Parallel Databases 32, 507–534 (2014)

    Article  Google Scholar 

  27. Barsoum, A.F., Hasan, M.A.: Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans. Inf. Forensics Secur. 10(3), 485–497 (2015)

    Article  Google Scholar 

  28. Dijk, M. van Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorhpic encryption over the integers. In: Advances in Cryptology—EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24–43 (2010)

  29. Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)

  30. Yi, X., Kaosar, M.G., Paulet, R., et al.: Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 25(5), 1125–1134 (2013)

    Article  Google Scholar 

  31. Yuan, J.W., Yu, S.C.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)

    Article  Google Scholar 

  32. Wang, H.Q., Wu, Q.H., Qin, B., et al.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114–121 (2014)

    Article  Google Scholar 

  33. Boyang, W., Baochun, L., Hui, L.: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)

    Article  Google Scholar 

  34. Amazon Elastic Compute Cloud (Amazon EC2) [online]. Available: http://aws.amazon.com/ec2/. Accessed Aug (2014)

  35. Amazon Simple Storage Service (Amazon EC3) [online]. Available: http://aws.amazon.com/s3/. Accessed Aug (2014)

  36. Pairing Based Cryptography (PBC) Library (2014). http://crypto.standford.edu/pbc/

Download references

Acknowledgments

The author thanks the editor and reviewers for their suggestions to improve the quality of paper. This work was supported by the National Natural Science Foundation of China under Grant No. 51307004.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinxia Wei.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yi, M., Wang, L. & Wei, J. Distributed data possession provable in cloud. Distrib Parallel Databases 35, 1–21 (2017). https://doi.org/10.1007/s10619-016-7190-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10619-016-7190-9

Keywords

Navigation