Skip to main content

Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9798))

Abstract

Cloud storage has been widely used to in services such as data outsourcing and resource sharing due to its convenience, low cost and flexibility. However, users will lose the physical control of their data after outsourcing; consequently, ensuring the integrity of their outsourced data becomes an important security requirement of multi-cloud storage applications. In this paper, we present a collaborative multi-cloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signatures and homomorphic tags. According to the proposed scheme, users can audit their outsourced data in a one-round challenge-response process with low performance overhead. Our scheme also enables public verification and supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We use the term user and client exchangeably in this paper.

References

  1. Amazon.com. Amazon web service. http://aws.amazon.com

  2. Google.com. http://www.google.com

  3. Baidu.com. http://www.baidu.com

  4. Yu, L., Chen, L., Cai, Z., Shen, H., Liang, Y., Pan, Y.: Stochastic load balancing for virtual resource management in datacenters. IEEE Trans. Cloud Comput. PP(99), 1–1 (2016)

    Google Scholar 

  5. Yu, L., Cai, Z.: Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters. In: Proceedings of the 35rd Annual IEEE Internationa Conference on Computer Communications (INFOCOM) (2016)

    Google Scholar 

  6. Deswarte, Y., Quisquater, J.J., Saidane, A.: Remote integrity checking. In: Proceedings of Conference on Integrity and Iternal Control in Information Systems 2003 (2003)

    Google Scholar 

  7. Filho, D.L.G., Baretto, P.: Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, Report /150 (2006)

    Google Scholar 

  8. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)

    Google Scholar 

  9. Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. Parallel Distrib. Syst. IEEE Trans. 22(5), 847–859 (2011)

    Article  Google Scholar 

  11. Zhu, Y., Hu, H., Ahn, G.-J., Han, Y., Chen, S.: Collaborative integrity verification in hybrid clouds. In: 7th International Conference on Collaborative Computing,: Networking, Applications and Worksharing (CollaborateCom), pp. 191–200. IEEE (2011)

    Google Scholar 

  12. Zhu, Y., Hu, H., Ahn, G.-J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. Parallel Distrib. Syst. IEEE Trans. 23(12), 2231–2244 (2012)

    Article  Google Scholar 

  13. Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 237–248. ACM (2011)

    Google Scholar 

  14. Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote integrity checking. Proc. IICIS 140, 1–11 (2003)

    Google Scholar 

  15. Gazzoni Filho, D.L., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. IACR Cryptology ePrint Arch. 2006, 150 (2006)

    Google Scholar 

  16. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 12 (2011)

    Article  Google Scholar 

  17. Juels, A., Kaliski Jr., B.S.: Pors,: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007)

    Google Scholar 

  18. Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptology 26(3), 442–483 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  19. Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 43–54. ACM (2009)

    Google Scholar 

  20. Bowers, K.D.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187–198. ACM (2009)

    Google Scholar 

  21. Naor, M., Rothblum, G.N.: The complexity of online memory checking. In: 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pp. 573–582. IEEE (2005)

    Google Scholar 

  22. Xu, J., Chang, E.-C.: Towards efficient proofs of retrievability. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 79–80. ACM (2012)

    Google Scholar 

  23. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM: Proceedings IEEE, pp. 1–9. IEEE (2010)

    Google Scholar 

  24. Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 15 (2015)

    Article  Google Scholar 

  25. Clarke, D., Devadas, S., van Dijk, M., Gassend, B., Suh, G.E.: Incremental multiset hash functions and their application to memory integrity checking. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 188–207. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  26. Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DARPA Information Survivability Conference and Exposition II: DISCEX 2001. Proceedings, vol. 2, pp. 68–82. IEEE (2001)

    Google Scholar 

  27. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 514. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  28. Merkle, R.C.: Protocols for public key cryptosystems. In: null, p. 122. IEEE (1980)

    Google Scholar 

  29. Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. Knowl. Data Eng. IEEE Trans. 23(9), 1432–1437 (2011)

    Article  Google Scholar 

  30. Yu, Y., Au, M.H., Yi Mu, S.T., Ren, J., Susilo, W., Dong, L.: Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Secur. 14, 307–318 (2015)

    Article  Google Scholar 

  31. Fan, X., Yang, G., Mu, Y., Yu, Y.: On indistinguishability in remote data integrity checking. Comput. J. 58, 823–830 (2015)

    Article  Google Scholar 

  32. Wang, H., Zhang, Y.: On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. Parallel Distrib. Syst. IEEE Trans. 25(1), 264–267 (2014)

    Article  Google Scholar 

  33. Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China (No. 61402029), the National Key Basic Research Program (NKBRP) (973 Program) (No. 2012CB315905), the National Natural Science Foundation of China (No. 61370190), Beijing Natural Science Foundation (No. 4162020), Singapore Ministry of Education under NUS grant R-252-000-539-112.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Mao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Mao, J., Cui, J., Zhang, Y., Ma, H., Zhang, J. (2016). Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment. In: Yang, Q., Yu, W., Challal, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2016. Lecture Notes in Computer Science(), vol 9798. Springer, Cham. https://doi.org/10.1007/978-3-319-42836-9_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42836-9_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42835-2

  • Online ISBN: 978-3-319-42836-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics