An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems

被引:22
作者
Shen, Shiuan-Tzuo [1 ]
Lin, Hsiao-Ying [2 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 30010, Taiwan
[2] Natl Chiao Tung Univ, Intelligent Informat & Commun Res Ctr, Hsinchu 30010, Taiwan
关键词
Data confidentiality; data robustness; homomorphism; integrity check; secure decentralized erasure code; PROVABLE DATA POSSESSION;
D O I
10.1109/TR.2015.2423192
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the application of cloud storage, a user no longer possesses his files in his local depository. Thus, he is concerned about the security of the stored files. Data confidentiality and data robustness are the main security issues. For data confidentiality, the user can first encrypt files and then store the encrypted files in a cloud storage. For data robustness, there are two concerns: service failure, and service corruption. We are concerned about data robustness in cloud storage services. Lin and Tzeng proposed a secure erasure code-based storage system with multiple key servers recently. Their system supports a repair mechanism, where a new storage server can compute a new ciphertext from the ciphertexts obtained from the remaining storage servers. Their system considers data confidentiality in the cloud, and data robustness against storage server failure. In this paper, we propose an integrity check scheme for their system to enhance data robustness against storage server corruption, which returns tampered ciphertexts. With our integrity check scheme, their storage system can deal with not only the problem of storage server failure, but also the problem of storage server corruption. The challenging part of our work is to have homomorphic integrity tags. New integrity tags can be computed from old integrity tags by storage servers without involvement of the user's secret key or backup servers. We prove the security of our integrity check scheme formally, and establish the parameters for achieving an overwhelming probability of a successful data retrieval.
引用
收藏
页码:840 / 851
页数:12
相关论文
共 40 条
[1]  
[Anonymous], P MULT COMP NETW MMC
[2]  
[Anonymous], LECT NOTES COMPUT SC
[3]  
[Anonymous], P 5 INT WORKSH PEER
[4]  
[Anonymous], 2013, IEEE T COMPUT, DOI DOI 10.1109/TC.2011.245
[5]  
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI DOI 10.1145/1460877.1460889
[6]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[7]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[8]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[9]  
Bo Chen, 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P515, DOI 10.1109/ICDCSW.2012.57
[10]  
Bolosky WJ, 2000, PERF E R SI, V28, P34, DOI 10.1145/345063.339345