A secure remote data integrity checking cloud storage system from threshold encryption

被引:12
|
作者
Yao, Chuan [1 ]
Xu, Li [1 ,2 ]
Huang, Xinyi [1 ]
Liu, Joseph K. [3 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350108, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing, Jiangsu, Peoples R China
[3] Inst Infocomm Res, Singapore, Singapore
基金
中国国家自然科学基金;
关键词
Distributed storage; Storage; Threshold encryption; Security;
D O I
10.1007/s12652-014-0236-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The confidentiality and integrity are the most important issues in cloud storage system. We address the privacy issue of decentralized cloud storage system using threshold cryptography. Once the user uploads his data and deletes the local copy, he might lost the full control of the data. The major challenges of designing this cloud storage system are to provide a better privacy guarantee and ensure the integrity of data at untrusted servers in distributed cloud storage system. To achieve this goal, we propose a threshold encryption scheme and integrate it with a secure decentralized erasure code to form a secure cloud storage system, where the user generates a secret parameter participated in system encryption and decryption of plaintext blocks in the combine process. So our systems can prevent cloud storage servers from modifying data by providing remote data check and meets the requirements of data robustness, confidentiality and integrity.
引用
收藏
页码:857 / 865
页数:9
相关论文
共 50 条
  • [1] A secure remote data integrity checking cloud storage system from threshold encryption
    Chuan Yao
    Li Xu
    Xinyi Huang
    Joseph K. Liu
    Journal of Ambient Intelligence and Humanized Computing, 2014, 5 : 857 - 865
  • [2] Public Auditing System: Improved Remote Data Possession Checking Protocol for Secure Cloud Storage
    Rashmi, Patil R.
    Sangve, S. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 75 - 80
  • [3] Secure data storage in the cloud with homomorphic encryption
    Bensitel, Yasmina
    Romadi, Rahal
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 1 - 6
  • [4] On Fractal Way of Checking Data Storage Integrity in Cloud Storage
    Hariharasitaraman, S.
    Balakannan, S. P.
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [5] Remote Data Checking With a Designated Verifier in Cloud Storage
    Yan, Hao
    Li, Jiguo
    Zhang, Yichen
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1788 - 1797
  • [6] Data Integrity and Data Dynamics with Secure Storage Service in Cloud
    Nithiavathy, R.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [7] Secure Remote Data Collection System Using Data Encryption
    Rodrigues, Bruno
    Cardoso, Alberto
    Bernardino, Jorge
    Simoes, Nuno
    Marques, Jose
    IFAC PAPERSONLINE, 2019, 52 (27): : 400 - 405
  • [8] A Survey on Data Integrity Checking in Cloud
    Dong, Yihui
    Sun, Le
    Liu, Dengzhi
    Feng, Meng
    Miao, Tiantian
    2018 FIRST INTERNATIONAL COGNITIVE CITIES CONFERENCE (IC3 2018), 2018, : 109 - 113
  • [9] Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage
    Li, Wenchao
    Susilo, Willy
    Xia, Chunhe
    Huang, Luqi
    Guo, Fuchun
    Wang, Tianbo
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5359 - 5373
  • [10] SSTreasury plus : A Secure and Elastic Cloud Data Encryption System
    Huang, Kuan-Ying
    Luo, Guo-Heng
    Yuan, Shyan-Ming
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 518 - 521