Full integrity and freshness for cloud data

被引:29
作者
Jin, Hao [1 ]
Zhou, Ke [1 ]
Jiang, Hong [2 ]
Lei, Dongliang [1 ]
Wei, Ronglei [1 ]
Li, Chunhua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Hubei, Peoples R China
[2] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 80卷
基金
中国国家自然科学基金;
关键词
Confidentiality; Full integrity; Data freshness; Proofs of storage; Integrity auditing; BROADCAST ENCRYPTION; STORAGE;
D O I
10.1016/j.future.2016.06.013
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data outsourcing relieves cloud users of the heavy burden of infrastructure management and maintenance. However, the handover of data control to untrusted cloud servers significantly complicates the security issues. Conventional signature verification widely adopted in cryptographic storage systems only guarantees the integrity of retrieved data, for those rarely or never accessed data, it does not work. This paper integrates proof of storage technique with data dynamics support into cryptographic storage design to provide full integrity for outsourced data. Besides, we provide instantaneously freshness check for retrieved data to defend against potential replay attacks. We achieve these goals by designing flexible block structures and combining broadcast encryption, key regression, Merkle hash tree and proof of storage together to provide a secure storage service for outsourced data. Experimental evaluation of our prototype shows that the cryptographic cost and throughput are reasonable and acceptable. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:640 / 652
页数:13
相关论文
共 45 条
[31]  
Kher V., 2005, P 2005 ACM WORKSH ST, P9
[32]  
Kumbhare A., 2012, 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), P510, DOI 10.1109/CLOUD.2012.109
[33]  
Li JY, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P121
[34]   Depot: Cloud Storage with Minimal Trust [J].
Mahajan, Prince ;
Setty, Srinath ;
Lee, Sangmin ;
Clement, Allen ;
Alvisi, Lorenzo ;
Dahlin, Mike ;
Walfish, Michael .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2011, 29 (04)
[35]  
Mazieres David., 2002, PODC '02: Proceedings of the 21st Annual Symposium on Principles of Distributed Computing, P108
[36]  
Merkle R. C., 1980, Proceedings of the 1980 Symposium on Security and Privacy, P122
[37]  
Miller EL, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FAST'02 CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, P1
[38]   Efficient remote data possession checking in critical information infrastructures [J].
Sebe, Francesc ;
Domingo-Ferrer, Josep ;
Martinez-Balleste, Antoni ;
Deswarte, Yves ;
Quisquater, Jean-Jacques .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (08) :1034-1038
[39]  
Shacham H, 2008, LECT NOTES COMPUT SC, V5350, P90, DOI 10.1007/978-3-540-89255-7_7
[40]  
Shah MehulA., 2008, IACR Cryptology ePrint Archive, V2008, P186