Abstract
Cloud storage has been widely used to in services such as data outsourcing and resource sharing due to its convenience, low cost and flexibility. However, users will lose the physical control of their data after outsourcing; consequently, ensuring the integrity of their outsourced data becomes an important security requirement of multi-cloud storage applications. In this paper, we present a collaborative multi-cloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signatures and homomorphic tags. According to the proposed scheme, users can audit their outsourced data in a one-round challenge-response process with low performance overhead. Our scheme also enables public verification and supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
We use the term user and client exchangeably in this paper.
References
Amazon.com. Amazon web service. http://aws.amazon.com
Google.com. http://www.google.com
Baidu.com. http://www.baidu.com
Yu, L., Chen, L., Cai, Z., Shen, H., Liang, Y., Pan, Y.: Stochastic load balancing for virtual resource management in datacenters. IEEE Trans. Cloud Comput. PP(99), 1–1 (2016)
Yu, L., Cai, Z.: Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters. In: Proceedings of the 35rd Annual IEEE Internationa Conference on Computer Communications (INFOCOM) (2016)
Deswarte, Y., Quisquater, J.J., Saidane, A.: Remote integrity checking. In: Proceedings of Conference on Integrity and Iternal Control in Information Systems 2003 (2003)
Filho, D.L.G., Baretto, P.: Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, Report /150 (2006)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)
Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. Parallel Distrib. Syst. IEEE Trans. 22(5), 847–859 (2011)
Zhu, Y., Hu, H., Ahn, G.-J., Han, Y., Chen, S.: Collaborative integrity verification in hybrid clouds. In: 7th International Conference on Collaborative Computing,: Networking, Applications and Worksharing (CollaborateCom), pp. 191–200. IEEE (2011)
Zhu, Y., Hu, H., Ahn, G.-J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. Parallel Distrib. Syst. IEEE Trans. 23(12), 2231–2244 (2012)
Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 237–248. ACM (2011)
Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote integrity checking. Proc. IICIS 140, 1–11 (2003)
Gazzoni Filho, D.L., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. IACR Cryptology ePrint Arch. 2006, 150 (2006)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 12 (2011)
Juels, A., Kaliski Jr., B.S.: Pors,: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptology 26(3), 442–483 (2013)
Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 43–54. ACM (2009)
Bowers, K.D.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 187–198. ACM (2009)
Naor, M., Rothblum, G.N.: The complexity of online memory checking. In: 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pp. 573–582. IEEE (2005)
Xu, J., Chang, E.-C.: Towards efficient proofs of retrievability. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 79–80. ACM (2012)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM: Proceedings IEEE, pp. 1–9. IEEE (2010)
Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 15 (2015)
Clarke, D., Devadas, S., van Dijk, M., Gassend, B., Suh, G.E.: Incremental multiset hash functions and their application to memory integrity checking. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 188–207. Springer, Heidelberg (2003)
Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DARPA Information Survivability Conference and Exposition II: DISCEX 2001. Proceedings, vol. 2, pp. 68–82. IEEE (2001)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, p. 514. Springer, Heidelberg (2001)
Merkle, R.C.: Protocols for public key cryptosystems. In: null, p. 122. IEEE (1980)
Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. Knowl. Data Eng. IEEE Trans. 23(9), 1432–1437 (2011)
Yu, Y., Au, M.H., Yi Mu, S.T., Ren, J., Susilo, W., Dong, L.: Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Secur. 14, 307–318 (2015)
Fan, X., Yang, G., Mu, Y., Yu, Y.: On indistinguishability in remote data integrity checking. Comput. J. 58, 823–830 (2015)
Wang, H., Zhang, Y.: On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage. Parallel Distrib. Syst. IEEE Trans. 25(1), 264–267 (2014)
Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)
Acknowledgment
This work was supported in part by the National Natural Science Foundation of China (No. 61402029), the National Key Basic Research Program (NKBRP) (973 Program) (No. 2012CB315905), the National Natural Science Foundation of China (No. 61370190), Beijing Natural Science Foundation (No. 4162020), Singapore Ministry of Education under NUS grant R-252-000-539-112.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Mao, J., Cui, J., Zhang, Y., Ma, H., Zhang, J. (2016). Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment. In: Yang, Q., Yu, W., Challal, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2016. Lecture Notes in Computer Science(), vol 9798. Springer, Cham. https://doi.org/10.1007/978-3-319-42836-9_45
Download citation
DOI: https://doi.org/10.1007/978-3-319-42836-9_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42835-2
Online ISBN: 978-3-319-42836-9
eBook Packages: Computer ScienceComputer Science (R0)