Distributed SCFMBF Based Protocol for Integrity In Cloud Storage System (DPICS)

被引:0
|
作者
Asl, Hananeh Sasaniyan [1 ]
Tazehkand, Behzad Mozaffari [1 ]
Museviniya, Mir Javad [1 ]
机构
[1] Univ Tabriz, Fac Elect & Comp Engn, Tabriz, Iran
来源
SN APPLIED SCIENCES | 2020年 / 2卷 / 02期
关键词
Bloom filter; Cloud; Integrity; Hash Function; Distribution; Channel Coding; Cuckoo filter; BLOOM FILTERS; SCHEME;
D O I
10.1007/s42452-020-1951-9
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud storage allowed the data owners to store their data without the burden of local hardware. There were some security concerns because of the cloud being untrusted. To make sure the stored data was intact since it was impractical to download the full data, a security mechanism named integrity check was used. Integrity check was achieved by probabilistic structures such as bloom filter and cuckoo filter. Uploading data file on to one cloud server could be a point of failure, instead the file could be distributed over l servers. Distributed SCFMBF Based Protocol for Integrity in Cloud Storage System (DPICS) was proposed to remotely check data integrity in a more effective way. Smart Cuckoo Filter Modified by Bloom Filter (SCFMBF) was a protocol that improved some of the performance properties of cuckoo filter such as false positive rate and insertion performance and solved some drawbacks of the cuckoo algorithm such as endless loop. Main characteristic of the bloom filter was used to improve cuckoo filter as the protocol name describes. First bloom filter was used as the integrity check method in cloud but bloom filter was not suitable for dynamic environment, SCFMBF was substituted for bloom filter because it had low false positive probability in integrity check and could cope well with dynamic data. How DPICS was more efficient than other previous works, was shown in terms of false positive probability, integrity check and retrievability.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Isolated Distributed Architecture for Cloud-Storage Services Based on Structured Strategy
    Gao, Ying
    Zheng, Jianlin
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE OF MODERN COMPUTER SCIENCE AND APPLICATIONS, 2013, 191 : 31 - 37
  • [22] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [23] Cloud-based authenticated protocol for healthcare monitoring system
    Chandrakar, Preeti
    Sinha, Sonam
    Ali, Rifaqat
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (08) : 3431 - 3447
  • [24] Identity-based remote data integrity auditing from lattices for secure cloud storage
    Yang, Songrun
    Chang, Jinyong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 5833 - 5844
  • [25] An identity-based integrity verification scheme for cloud storage in 5G environment
    Wu, Zuodong
    Zhang, Jianwei
    Cai, Zengyu
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2020, 64 (02) : 168 - 177
  • [26] Research on Cloud Storage Integrity of Wireless Body Area Network Data Based on Blockchain Technology
    Gao Y.-F.
    Yao L.
    Ma Y.-S.
    Li F.-Y.
    Yao, Lan (yaolan@mail.neu.edu.cn), 1600, Northeast University (41): : 337 - 342
  • [27] Smart contract-based public integrity auditing for cloud storage against malicious auditors
    Tian, Hui
    Gan, Nan
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    Vasilakos, Athanasios V.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 166
  • [28] Popularity-based multiple-replica cloud storage integrity auditing for big data
    Chen, Guoqing
    Hao, Rong
    Yang, Ming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 163
  • [29] Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage
    Srivastav, Niharika
    Mathew, Rejo
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 522 - 528
  • [30] An identity-based integrity verification scheme for cloud storage in 5G environment
    Wu Z.
    Zhang J.
    Cai Z.
    Zhang, Jianwei (mailzjw@163.com), 1600, Inderscience Publishers (64): : 168 - 177