An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage

被引:4
作者
Abbdal, Salah H. [1 ]
Jin, Hai [1 ]
Yassin, Ali A. [2 ]
Abduljabbar, Zaid Ameen [1 ,2 ]
Hussain, Mohammed Abdulridha [1 ,2 ]
Hussien, Zaid Alaa [1 ,3 ]
Zou, Deqing [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Serv Comp Technol & Syst Lab, Cluster & Grid Comp Lab, Wuhan 430074, Peoples R China
[2] Univ Basrah, Basrah, Iraq
[3] Southern Tech Univ, Basrah, Iraq
来源
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2016年
关键词
Cloud computing; cloud storage; data storage correctness; elliptic curve digital signature algorithm; public verifiability;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a novel paradigm in information technology. This approach involves methods that forward services to users on demand via pay-as-you-go. Cloud computing can reduce computation and communication costs, and this advantage has resulted in the influx of cloud computing users. Cloud storage, which allows users to remotely outsource their data to the cloud, is considered a major cloud computing service. However, this form of storage introduces new security challenges, such as unreliable service providers. Data storage correctness is another challenge that should be addressed before this modern storage model can be extensively applied. Most proposed schemes for data integrity verification use a third party auditor, specifically a single third party auditor. However, a single third party auditor may become a bottleneck in the overall system operation and may degrade system performance because thousands of users may delegate their tasks to a single third party auditor. In this paper, we propose a new scheme for securing data integrity via a multiple third party auditors based mutual authentication to overcome the aforementioned limitations and ensure high-level security. We suggest a remote data storage correctness checking scheme based on homomorphic linear authentication and an elliptic curve digital signature algorithm to support public verifiability. Our proposed scheme uses a Merkle hash tree at the cloud server to store data, thereby enabling rapid data access. Finally, our proposed scheme identifies misbehaving servers and verifies data storage correctness.
引用
收藏
页码:412 / 417
页数:6
相关论文
共 14 条
  • [1] [Anonymous], 2014, P GLOB SUMM COMP INF
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Deswarte Y., 2003, INTEGRITY INTERNAL C, P1, DOI [10.1007/1-4020-7901-X_1, DOI 10.1007/1-4020-7901-X_1]
  • [4] Junfeng Tian, 2012, Proceedings of the 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring (CDCIEM 2012), P78, DOI 10.1109/CDCIEM.2012.25
  • [5] Fabrication of graphene oxide decorated with Fe3O4@SiO2 for immobilization of cellulase
    Li, Yue
    Wang, Xiang-Yu
    Jiang, Xiao-Ping
    Ye, Jing-Jing
    Zhang, Ye-Wang
    Zhang, Xiao-Yun
    [J]. JOURNAL OF NANOPARTICLE RESEARCH, 2015, 17 (01)
  • [6] Merkle R. C., 1980, Proceedings of the 1980 Symposium on Security and Privacy, P122
  • [7] Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm
    Qiu, Meikang
    Ming, Zhong
    Li, Jiayin
    Gai, Keke
    Zong, Ziliang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3528 - 3540
  • [8] A REVIEW ON CLOUD DATA SECURITY AND ITS MITIGATION TECHNIQUES
    Selvamani, K.
    Jayanthi, S.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 347 - 352
  • [9] Compact Proofs of Retrievability
    Shacham, Hovav
    Waters, Brent
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (03) : 442 - 483
  • [10] Toward Secure and Dependable Storage Services in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Cao, Ning
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 220 - 232