Certificateless Dynamic Data Integrity Verification using Lattices in Cloud Storage

被引:2
作者
Chinthakunta, Sasikala [1 ]
Chigarepalli, Shoba Bindu [2 ]
机构
[1] JNT Univ Anantapur, Dept CSE, Anantapur 515002, Andhra Pradesh, India
[2] JNTUA Coll Engn, Dept CSE, Anantapur 515002, Andhra Pradesh, India
来源
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING | 2018年 / 11卷 / 10期
关键词
Cloud storage; Data dynamics; Integrity; Merkele Hash Tree; Third Party Auditor;
D O I
10.14257/ijgdc.2018.11.10.06
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Because of the data outsourcing in cloud, user loss his control and physical possession of the data. So, data integrity and security is a major problem in Cloud Storage. To solve this problem several Remote Data Integrity Checking (RDIC) schemes have been proposed, but most of them do not support the integrity verification over dynamically updated outsourced data. This paper, presents a Certificateless dynamic data integrity checking scheme using Merkele Hash Tree (MHT) data structure and Lattice based homomorphic linear signatures. MHT is an authenticated binary search tree used for block authentication to perform data update operations such as Modification, Insertion and Deletion. And, we apply Random masking technique to preserve the privacy against TPA. The experimental results of the proposed scheme are compared with the state-of-the art; they show the efficiency of the method.
引用
收藏
页码:65 / 74
页数:10
相关论文
共 15 条
[1]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
ATENIESE Giuseppe., 2008, P 4 INT C SEC PRIV C, P1
[4]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[5]  
Erway C., 2008, 2008432 CRYPT EPRINT
[6]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[7]  
KREBS B, 2009, PAYMENT PROCESSOR BR
[8]   Certificateless remote data integrity checking using lattices in cloud storage [J].
Sasikala, C. ;
Bindu, C. Shoba .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (05) :1513-1519
[9]   Real-Time Snowing Simulation Based on Particle Systems [J].
Tan, Yao ;
Zhang, Xiangjuan ;
Wang, Chunyan ;
Zhao, Qiao .
PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, :7-11
[10]  
Tian H., 2017, IEEE T SERVICES COMP, V10