OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices

被引:57
|
作者
Li, Jin [1 ,2 ]
Tan, Xiao [3 ]
Chen, Xiaofeng [2 ]
Wong, Duncan S. [3 ]
Xhafa, Fatos [4 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[4] Tech Univ Catalonia, Dept Languages & Informat Syst, Barcelona, Spain
关键词
Cloud storage; proof of retrievability; integrity; auditing;
D O I
10.1109/TCC.2014.2366148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in cloud computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users with resource-constrained devices to compute the public authentication tags of file blocks. To tackle the challenge, we propose OPoR, a new cloud storage scheme involving a cloud storage server and a cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. OPoR outsources and offloads the heavy computation of the tag generation to the cloud audit server and eliminates the involvement of user in the auditing and in the pre-processing phases. Furthermore, we strengthen the proof of retrievability (PoR) model to support dynamic data operations, as well as ensure security against reset attacks launched by the cloud storage server in the upload phase.
引用
收藏
页码:195 / 205
页数:11
相关论文
共 50 条
  • [21] Code protection for resource-constrained embedded devices
    Saputra, H
    Chen, G
    Brooks, R
    Vijaykrishnan, N
    Kandemir, M
    Irwin, MJ
    ACM SIGPLAN NOTICES, 2004, 39 (07) : 240 - 248
  • [22] Lightweight Strong PUF for Resource-Constrained Devices
    Korona, Mateusz
    Giermakowski, Radoslaw
    Biernacki, Mateusz
    Rawski, Mariusz
    ELECTRONICS, 2024, 13 (02)
  • [23] Secure Communications for Resource-Constrained IoT Devices†
    Taha, Abd-Elhamid M.
    Rashwan, Abdulmonem M.
    Hassanein, Hossam S.
    SENSORS, 2020, 20 (13) : 1 - 18
  • [24] Energy Consumption Awareness for Resource-Constrained Devices
    Silva, Edgar M.
    Malo, Pedro
    Albano, Michele
    2016 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2016, : 74 - 78
  • [25] Image Polarity Detection on Resource-Constrained Devices
    Ragusa, Edoardo
    Gianoglio, Christian
    Zunino, Rodolfo
    Gastaldo, Paolo
    IEEE INTELLIGENT SYSTEMS, 2020, 35 (06) : 50 - 57
  • [26] Improving the Efficiency of Transformers for Resource-Constrained Devices
    Tabani, Hamid
    Balasubramaniam, Ajay
    Marzban, Shabbir
    Arani, Elahe
    Zonooz, Bahram
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 449 - 456
  • [27] Towards a distributed platform for resource-constrained devices
    Messer, A
    Greenberg, I
    Bernadat, P
    Milojicic, D
    Chen, DQ
    Giuli, TJ
    Gu, XH
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 43 - 51
  • [28] A JiniTM Lookup service for resource-constrained devices
    Smith, L
    Roe, C
    Knudsen, KS
    2002 IEEE 4TH INTERNATIONAL WORKSHOP ON NETWORKED APPLIANCES, PROCEEDINGS, 2002, : 135 - 144
  • [29] FINE-GRAINED ACCESS CONTROL SYSTEMS SUITABLE FOR RESOURCE-CONSTRAINED USERS IN CLOUD COMPUTING
    Zhang, Yinghui
    Zheng, Dong
    Guo, Rui
    Zhao, Qinglan
    COMPUTING AND INFORMATICS, 2018, 37 (02) : 327 - 348
  • [30] Entity Notation: enabling knowledge representations for resource-constrained sensors
    Xiang Su
    Jukka Riekki
    Janne Haverinen
    Personal and Ubiquitous Computing, 2012, 16 : 819 - 834