Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage

被引:18
作者
Su, Yuan [1 ]
Li, Yanping [1 ,2 ]
Yang, Bo [3 ]
Ding, Yong [4 ]
机构
[1] Shaanxi Normal Univ, Sch Math & Stat, Xian 710119, Shaanxi, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Shaanxi, Peoples R China
[4] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
关键词
Cascading style sheets; Cloud computing; Servers; Security; Task analysis; Location awareness; Data integrity; Decentralized; self-auditing; errors localization; symmetric balanced incomplete block design (SBIBD); PROVABLE DATA POSSESSION;
D O I
10.1109/TDSC.2021.3075984
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of cloud storage, increasing users begin to outsource data to the cloud. In order to resist possible data analysis for centralized outsourced data and improve the fault tolerance, users prefer to distribute data to cloud servers of different cloud service providers. However, once the data have been outsourced, it will be out of user's control and many security issues may occur, such as outsourced data being illegally tamper with, or rarely accessed data being secretly deleted. In this article, we propose a decentralized self-auditing scheme for multi-cloud storage, called DSAS. First, based on the symmetric balanced incomplete block design, DSAS achieves integrity verification for outsourced data via the interactions of cloud servers and the auditing costs are shared by the participating CSs. Second, DSAS can locate misbehavior cloud server with low computation costs, and resist denial of service attack initiated by malicious cloud servers which attempts to destroy the audit. Third, DSAS can recover the corrupted data without fetching data, and support the revocation of cloud servers and batch auditing. Finally, security proof and function evaluation show that DSAS has comprehensive security and functionality, and performance simulations and experiment results show that DSAS is efficient.
引用
收藏
页码:2838 / 2850
页数:13
相关论文
共 31 条
  • [1] [Anonymous], 2012, The GNU Multiple Precision Complex Library
  • [2] [Anonymous], PAIRING BASED CRYPTO
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] Bloemer Johannes, 1995, XOR BASED ERASURE RE
  • [5] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [6] Chung Ilyong, 2004, Journal of Applied Mathematics and Informatics, V14, P343
  • [7] A Lightweight And privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities
    Han, Jing
    Li, Yanping
    Chen, Weifeng
    [J]. COMPUTER STANDARDS & INTERFACES, 2019, 62 : 84 - 97
  • [8] An Efficient Public Batch Auditing Protocol for Data Security in Multi-Cloud Storage
    He Kai
    Huang Chuanhe
    Wang Jinhai
    Zhou Hao
    Chen Xi
    Lu Yilong
    Zhang Lianzhen
    Wang Bin
    [J]. 2013 8TH CHINAGRID ANNUAL CONFERENCE (CHINAGRID), 2013, : 51 - 56
  • [9] IDC, 2019 THAL DAT THREAT
  • [10] Dynamic and Public Auditing with Fair Arbitration for Cloud Data
    Jin, Hao
    Jiang, Hong
    Zhou, Ke
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) : 680 - 693