Abstract
Nowadays, many organizations outsource their data to remote cloud servers. In order to increase the availability of data, the data owners store their data replicas on multiple servers. In this paper, we propose a dynamic replicated data possession checking scheme that has three characteristics: the data owner uses fully homomorphic encryption algorithm to generate multiple copies; the scheme supports data block dynamic operation; our scheme can identify the corrupted data block. Finally, security analysis and experimental results show that our scheme can resist forge, replace and replay attack, and perform better than some other related scheme published recently.
Similar content being viewed by others
References
Jula, A., Sundararajan, E., Othman, Z.: Cloud computing service composition: a systematic literature review article. Expert Syst. Appl. 41(8), 3809–3824 (2014)
Wang, W., Zeng, G., Yao, J.: Cloud-DLS: dynamic trusted scheduling for cloud computing original research article. Expert Syst. Appl. 39(3), 2319–2321 (2012)
Lin, Y., Chang, P.: Maintenance reliability estimation for a cloud computing network with nodes failure. Expert Syst. Appl. 38(11), 14185–14189 (2011)
Ateniese, G., Burns, R., Curtmola, R., et al.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, 1–34 (2011)
Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM CCS 2007, pp. 598–609 (2007)
Sebe, F., Domingo-Ferrer, J., Martinez-Balleste, A., et al.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)
Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: HOTOS’07: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems, Berkeley, pp. 1–6 (2007)
Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. In: Cryptology ePrint Archive, Report 2008/186 (2008)
Zeng, K.: Publicly verifiable remote data integrity. In: Proceedings of the 10th International Conference on Information and Communications Security, Ser. ICICS ’08, pp. 419–434. Springer, Berlin (2008)
Juels, A., Burton, J., Kaliski, S.: Pors: proofs of retrievability for large files. In: ACM CCS 2007, pp. 584–597 (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference Theory and Application of Cryptology and Information Security, pp. 90–107 (2008)
Bowers, K.D., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings 16th ACM Conference on Computer and Communications Security (CCS). New York, pp. 187–198 (2009)
Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: theory and implementation. In: Proceedings of the ACM Workshop Cloud Computing Security (CCSW), pp. 43–54 (2009)
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Proceedings of the 6th Theory Cryptography Conference (TCC), pp. 109–127 (2009)
Curtmola, R., Khan, O., Burns, R.: Robust remote data checking. In: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, pp. 63–68 (2008)
Juels, A., Kaliski, B.S., Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 584–597 (2007)
Wang, C., Ren, K., Lou, W., et al.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010). doi:10.1109/MNET.2010.5510914
Ateniese, G., Pietro, R.D., Mancin, L.V., et al.: Scalable and efficient provable data possession. In: SecureComm 08: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, New York, pp. 1–10 (2008)
Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. In: Cryptology ePrint Archive, Report 2008/186 (2008)
Erway, C., Kupcu, A., Papamanthou, C., et al.: Dynamic provable data possession. In CCS 09: Proceedings of the 16th ACM Conference on Computer and Communications Security, New York, pp. 213–222 (2009)
Wang, Q., Wang, C., Li, J., Ren, K., et al.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: ESORICS09: Proceedings of the 14th European Conference on Research in Computer Security. Berlin, pp. 355–370 (2009)
Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. In: IEEE Transactions on Knowledge and Data Engineering, PrePrints, p. 99 (2011)
Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: 28th IEEE ICDCS, pp. 411–420 (2008)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) Advances in Cryptology-ASIACRYPT 2008, vol. 5350, pp. 90–107. Springer, Berlin (2008)
Barsoum, A.F., Hasan, M.A.: On verifying dynamic multiple data copies over cloud servers. In: Cryptology ePrint Archive, Report 2011/447 (2011). http://eprint.iacr.org/
Raghul, M., Sanjay, M., Mark, L.: Efficient integrity verification of replicated data in cloud using homomorphic encryption. Distrib. Parallel Databases 32, 507–534 (2014)
Barsoum, A.F., Hasan, M.A.: Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans. Inf. Forensics Secur. 10(3), 485–497 (2015)
Dijk, M. van Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorhpic encryption over the integers. In: Advances in Cryptology—EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24–43 (2010)
Boneh, D., Lynn, B., Shacham, H.: Short signature from the Weil pairing. In: ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Yi, X., Kaosar, M.G., Paulet, R., et al.: Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 25(5), 1125–1134 (2013)
Yuan, J.W., Yu, S.C.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)
Wang, H.Q., Wu, Q.H., Qin, B., et al.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114–121 (2014)
Boyang, W., Baochun, L., Hui, L.: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)
Amazon Elastic Compute Cloud (Amazon EC2) [online]. Available: http://aws.amazon.com/ec2/. Accessed Aug (2014)
Amazon Simple Storage Service (Amazon EC3) [online]. Available: http://aws.amazon.com/s3/. Accessed Aug (2014)
Pairing Based Cryptography (PBC) Library (2014). http://crypto.standford.edu/pbc/
Acknowledgments
The author thanks the editor and reviewers for their suggestions to improve the quality of paper. This work was supported by the National Natural Science Foundation of China under Grant No. 51307004.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yi, M., Wang, L. & Wei, J. Distributed data possession provable in cloud. Distrib Parallel Databases 35, 1–21 (2017). https://doi.org/10.1007/s10619-016-7190-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10619-016-7190-9