Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data
Cloud storage is widely used to ease the storage burden of clients. Meanwhile it raises a basic issue in the security of outsourced data: whether the corruption can be detected and recovered? Focusing on this problem, most existing proofs of retrievability (POR) schemes relies on precomputed tokens or tags as well as code redundancy to achieve integrity verification and corruption recovery, which, however, results in extra storage cost for cloud storage and high computational overhead for clients. Fragile watermarking provides a new way to implement the scheme without such drawbacks. In this paper, we propose a novel fragile watermarking based public auditable POR scheme for archival cloud data, which is able to not only improve the efficiency of audit process but also ensure both privacy-preserving and replay attack resistance simultaneously. The simulation results validate both the correctness of our scheme in detecting and recovering data corruption and the large improvement in performance compared to traditional POR schemes.
KeywordsFragile watermarking Proofs of retrievability Cloud storage
This work is supported by the National Natural Science Foundation of China under Grant No. U1405254, No. U1536201 and No. 61472092; The National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA020101.
- 1.Zhang, Q.L., Dai, Y.F., Zhang, L.T.: UStore: a low cost cold and archival data storage system for data centers. In: 35th IEEE International Conference on Distributed Computing Systems, Columbus, pp. 431–441. IEEE Press (2015)Google Scholar
- 2.Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM, New York (2007)Google Scholar
- 3.Wang, C., Wang, Q., Ren, K., Lou, W.J.: Privacy-preserving public auditing for data storage security in cloud computing. In: 30th IEEE International Conference on Computer Communications, San Diego, pp. 1–9. IEEE Press (2010)Google Scholar
- 8.Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communications Security, pp. 584–597. ACM, New York (2007)Google Scholar
- 9.Wang, C., Wang, Q., Ren, K., Lou, W.J.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service, Charleston, pp. 1–9. IEEE Press (2009)Google Scholar
- 11.Cao, N., Yu, S.C., Yang, Z.Y., Lou, W.J., Hou, Y.T.: LT codes-based secure and reliable cloud storage service. In: 32th IEEE International Conference on Computer Communications, Orlando, pp. 693–701. IEEE Press (2012)Google Scholar
- 12.Chen, C.H., Lee, P.C.: Enabling data integrity protection in regenerating-coding-based cloud storage. In: IEEE Symposium on Reliable Distributed Systems, Irvine, pp. 51–60. IEEE Press (2012)Google Scholar
- 14.Wong, P.W.: A public key watermark for image verification and authentication. In: 5th International Conference on Image Processing, Chicago, pp. 455–459. IEEE Press (1998)Google Scholar