Advertisement

Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data

  • Xin TangEmail author
  • Yining Qi
  • Yongfeng Huang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10082)

Abstract

Cloud storage is widely used to ease the storage burden of clients. Meanwhile it raises a basic issue in the security of outsourced data: whether the corruption can be detected and recovered? Focusing on this problem, most existing proofs of retrievability (POR) schemes relies on precomputed tokens or tags as well as code redundancy to achieve integrity verification and corruption recovery, which, however, results in extra storage cost for cloud storage and high computational overhead for clients. Fragile watermarking provides a new way to implement the scheme without such drawbacks. In this paper, we propose a novel fragile watermarking based public auditable POR scheme for archival cloud data, which is able to not only improve the efficiency of audit process but also ensure both privacy-preserving and replay attack resistance simultaneously. The simulation results validate both the correctness of our scheme in detecting and recovering data corruption and the large improvement in performance compared to traditional POR schemes.

Keywords

Fragile watermarking Proofs of retrievability Cloud storage 

Notes

Acknowledgment

This work is supported by the National Natural Science Foundation of China under Grant No. U1405254, No. U1536201 and No. 61472092; The National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA020101.

References

  1. 1.
    Zhang, Q.L., Dai, Y.F., Zhang, L.T.: UStore: a low cost cold and archival data storage system for data centers. In: 35th IEEE International Conference on Distributed Computing Systems, Columbus, pp. 431–441. IEEE Press (2015)Google Scholar
  2. 2.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM, New York (2007)Google Scholar
  3. 3.
    Wang, C., Wang, Q., Ren, K., Lou, W.J.: Privacy-preserving public auditing for data storage security in cloud computing. In: 30th IEEE International Conference on Computer Communications, San Diego, pp. 1–9. IEEE Press (2010)Google Scholar
  4. 4.
    Wang, Q., Wang, C., Ren, K., Lou, W.J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. 22, 847–859 (2010)CrossRefGoogle Scholar
  5. 5.
    Liu, C., Ranjan, R., Yang, C., Zhang, X.Y., Wang, L.Z., Chen, J.J.: MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64, 2609–2622 (2015)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Zhu, Y., Hu, H.X., Ahn, G.J., Yu, M.Y.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. 23, 2231–2244 (2012)CrossRefGoogle Scholar
  7. 7.
    Wang, H.Q.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8, 328–340 (2015)CrossRefGoogle Scholar
  8. 8.
    Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communications Security, pp. 584–597. ACM, New York (2007)Google Scholar
  9. 9.
    Wang, C., Wang, Q., Ren, K., Lou, W.J.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service, Charleston, pp. 1–9. IEEE Press (2009)Google Scholar
  10. 10.
    Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26, 442–483 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Cao, N., Yu, S.C., Yang, Z.Y., Lou, W.J., Hou, Y.T.: LT codes-based secure and reliable cloud storage service. In: 32th IEEE International Conference on Computer Communications, Orlando, pp. 693–701. IEEE Press (2012)Google Scholar
  12. 12.
    Chen, C.H., Lee, P.C.: Enabling data integrity protection in regenerating-coding-based cloud storage. In: IEEE Symposium on Reliable Distributed Systems, Irvine, pp. 51–60. IEEE Press (2012)Google Scholar
  13. 13.
    Yang, K., Jia, X.H.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. 24, 1717–1726 (2013)CrossRefGoogle Scholar
  14. 14.
    Wong, P.W.: A public key watermark for image verification and authentication. In: 5th International Conference on Image Processing, Chicago, pp. 455–459. IEEE Press (1998)Google Scholar
  15. 15.
    He, H.-J., Zhang, J.-S., Tai, H.-M.: Block-chain based fragile watermarking scheme with superior localization. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 147–160. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-88961-8_11 CrossRefGoogle Scholar
  16. 16.
    Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38, 2519–2529 (2005)CrossRefGoogle Scholar
  17. 17.
    Lee, T.Y., Lin, S.F.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41, 3497–3506 (2008)CrossRefzbMATHGoogle Scholar
  18. 18.
    Qian, Z.X., Feng, G.R., Zhang, X.P., Wang, S.Z.: Image self-embedding with high-quality restoration capability. Digit. Sig. Process. 21, 278–286 (2011)CrossRefGoogle Scholar
  19. 19.
    Deswarte, Y., Quisquater, J.-J., Saïdane, A.: Remote integrity checking. In: Jajodia, S., Strous, L. (eds.) Integrity and Internal Control in Information Systems VI. IIFIP, vol. 140, pp. 1–11. Springer, Heidelberg (2004). doi: 10.1007/1-4020-7901-X_1 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Electronic EngineeringTsinghua UniversityBeijingChina
  2. 2.Tsinghua National Laboratory for Information Science and TechnologyBeijingChina

Personalised recommendations