Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data

被引:1
作者
Wan, Jiawei [1 ,2 ,3 ]
Jia, Shijie [1 ,2 ,3 ]
Liu, Limin [1 ,2 ,3 ]
Zhang, Yang [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
来源
2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC) | 2020年
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Cloud storage; Storage security; Data dynamics; Integrity verification; DATA POSSESSION; SHARED DATA; SIGNATURES;
D O I
10.1109/IPCCC50635.2020.9391514
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage is an increasingly popular service of cloud computing, which can provide convenient on-demand data outsourcing services and release the burden of maintaining local data for both individuals and organizations. However, the cloud service providers are not fully trusted by the users. The reason is that the users lose physical control of their cloud data, and the cloud service providers may conceal the status of the data when encountering data loss accidents for reputation. Therefore, it is critical for users to efficiently verify the integrity of cloud data. In this paper, we propose a public integrity verification scheme to support efficient dynamic update of cloud data based on Merkle Hash Tree linked list (MHT-list), which is a novel two-dimensional data structure we designed. This structure utilizes multiple merkle hash trees (MHTs) and a linked list to record data information at the cloud service provider side. Meanwhile, we exploit the structural advantages of the MHT-list to make our scheme more efficient in dynamic update and integrity verification than existing works. Moreover, we formally prove the security of the proposed scheme and evaluate the performance of our scheme by concrete extensive experiments. The results demonstrate that our proposed scheme achieves dynamic update effectively in public integrity verification of cloud data, and outperforms the previous works in computation and communication overhead.
引用
收藏
页数:12
相关论文
共 30 条
[1]  
[Anonymous], 2018, IDC DIGITIZATION WOR
[2]  
Ateniese G, 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]   Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].
Barsoum, Ayad F. ;
Hasan, M. Anwar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :485-497
[5]  
Bellare M., 1993, ACM CCS 93 1 C COMPU, P62
[6]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[7]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[8]   Dynamic Provable Data Possession [J].
Erway, C. Chris ;
Kupcu, Alptekin ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
[9]  
Gagnaire M, 2012, TECH REP
[10]   Dynamic and Public Auditing with Fair Arbitration for Cloud Data [J].
Jin, Hao ;
Jiang, Hong ;
Zhou, Ke .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) :680-693