OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices

被引:57
|
作者
Li, Jin [1 ,2 ]
Tan, Xiao [3 ]
Chen, Xiaofeng [2 ]
Wong, Duncan S. [3 ]
Xhafa, Fatos [4 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[4] Tech Univ Catalonia, Dept Languages & Informat Syst, Barcelona, Spain
关键词
Cloud storage; proof of retrievability; integrity; auditing;
D O I
10.1109/TCC.2014.2366148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in cloud computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users with resource-constrained devices to compute the public authentication tags of file blocks. To tackle the challenge, we propose OPoR, a new cloud storage scheme involving a cloud storage server and a cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. OPoR outsources and offloads the heavy computation of the tag generation to the cloud audit server and eliminates the involvement of user in the auditing and in the pre-processing phases. Furthermore, we strengthen the proof of retrievability (PoR) model to support dynamic data operations, as well as ensure security against reset attacks launched by the cloud storage server in the upload phase.
引用
收藏
页码:195 / 205
页数:11
相关论文
共 50 条
  • [1] Provable Data Possession of Resource-Constrained Mobile Devices in Cloud Computing
    Yang, Jian
    Wang, Haihang
    Wang, Jian
    Tan, Chengxiang
    Yu, Dingguo
    Journal of Networks, 2011, 6 (07) : 1033 - 1040
  • [2] Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing
    Li, Chunlin
    Li, Layuan
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (04) : 2817 - 2837
  • [3] Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing
    Chunlin Li
    Layuan Li
    Wireless Personal Communications, 2014, 77 : 2817 - 2837
  • [4] Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices
    Zhou, Lei
    Fu, Anmin
    Yang, Guomin
    Gao, Yansong
    Yu, Shui
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4325 - 4342
  • [5] BePOCH: Improving Federated Learning Performance in Resource-Constrained Computing Devices
    Ibraimi, Lenart
    Selimi, Mennan
    Freitag, Felix
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [6] Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices
    Bettaieb, Slim
    Bidoux, Loïc
    Budroni, Alessandro
    Palumbi, Marco
    Perin, Lucas Pandolfo
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (04): : 84 - 109
  • [7] Enabling NFV Services on Resource-Constrained CPEs
    Bonafiglia, Roberto
    Miano, Sebastian
    Nuccio, Sergio
    Risso, Fulvio
    Sapio, Amedeo
    2016 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET), 2016, : 83 - 88
  • [8] Remote Gaming on Resource-Constrained Devices
    Reza, Waazim
    Kalva, Hari
    Kaufman, Richard
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXIII, 2010, 7798
  • [9] FedComp: A Federated Learning Compression Framework for Resource-Constrained Edge Computing Devices
    Wu, Donglei
    Yang, Weihao
    Jin, Haoyu
    Zou, Xiangyu
    Xia, Wen
    Fang, Binxing
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (01) : 230 - 243
  • [10] A distributed resource furnishing to offload resource-constrained devices in cyber foraging toward pervasive computing
    Ok, MinHwan
    Seo, Ja-Won
    Park, Myong-soon
    NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2007, 4658 : 416 - +