An Efficient Public Batch Auditing Protocol for Data Security in Multi-Cloud Storage

被引:25
作者
He Kai [1 ]
Huang Chuanhe [1 ]
Wang Jinhai [1 ]
Zhou Hao [1 ]
Chen Xi [1 ]
Lu Yilong [1 ]
Zhang Lianzhen [1 ]
Wang Bin [1 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan 430072, Peoples R China
来源
2013 8TH CHINAGRID ANNUAL CONFERENCE (CHINAGRID) | 2013年
关键词
Data Integrity; Batch Auditing; Data Corruption Identification; Multi-cloud Storage;
D O I
10.1109/ChinaGrid.2013.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud storage enables users to remotely store their data. However, this new paradigm of storage service also makes the integrity protection of outsourced data a very challenging issue. Recently many integrity auditing protocols have been proposed, but most of them focus on the single cloud environment or don't support batch auditing. In this paper, we propose a public batch data integrity auditing protocol for multi-cloud storage. In the protocol a third party auditor can simultaneously verify the multiple auditing requests from different users on distinct data files stored on different cloud storage servers. By utilizing homomorphic ciphertext verification and recoverable coding approach, the proposed protocol not only provides privacy-preserving public auditing for data integrity, but also achieves quick identification of corrupted data. With the batch auditing, the total auditing time can be reduced and the communication cost is also low. Extensive security and performance analysis show the proposed protocol is secure and efficient.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 22 条
[1]  
AlZain M. A., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P5490, DOI 10.1109/HICSS.2012.153
[2]  
[Anonymous], IEEE T PARALLEL DIST
[3]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[4]  
Ateniese G., 2008, P ICST SECURECOMM
[5]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]  
Barsoum A. F., 2012, Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), P829, DOI 10.1109/CCGrid.2012.55
[7]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[8]  
Camenisch J, 2007, LECT NOTES COMPUT SC, V4515, P246
[9]   RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks [J].
Chen, Chien-Ming ;
Lin, Yue-Hsun ;
Lin, Ya-Ching ;
Sun, Hung-Min .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) :727-734
[10]   MR-PDP: Multiple-Replica Provable Data Possession [J].
Curtmola, Reza ;
Khan, Osama ;
Burns, Randal ;
Ateniese, Giuseppe .
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, :411-+