Batch Provable Data Possession Scheme with Error Locating
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61379125); Natural Science Foundation of Shanxi Province (201601D021075, 201801D121154); Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi Province (2014143); Research Project Supported by Shanxi Scholarship Council of China (2015-083); Educational Reform Research Project for Graduate Students of Shanxi Province (2018JG62)

  • Article
  • | |
  • Metrics
  • |
  • Reference [23]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    Provable data possession is an important research field in cloud storage security.It allows the data owners remotely checking the integrity of their outsourced data without downloading all files.There have been many batch PDP schemes,but most of them did not consider the error location after the data of users were corrupted.A few batch PDP protocols can identify only the servers in which the corrupted data stored or the clients to which the corrupted data belongs.This study puts forward a method which utilizes location tags to help the third party auditor locating the error data quickly.Based on work by Zhou et al.,an error locating batch provable data possession scheme is proposed in multi-user and multi-cloud setting by using Merkle Hash tree to create data location tags.The proposed protocol can quickly locate the corrupted data owners and the servers where the error data stored after the batch verification fails.The proposed scheme is provably secure in random oracle model,and the performance analysis shows that the scheme has higher error locating ability and efficiency than other schemes that only have single location function.

    Reference
    [1] Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In:Proc. of the 14th ACM Conf. on Computer and Communications Security. ACM Press, 2007. 598-609.[doi:10.1145/1315245.1315318]
    [2] Ateniese G, Pietro RD, Mancini LV, Tsudik G. Scalable and efficient provable data possession. In:Proc. of the 4th Int'l Conf. on Security and Privacy in Communication Networks. ACM Press, 2008. 1-10.[doi:10.1145/1460877.1460889]
    [3] Wang Q, Wang C, Li J, Ren K, Lou WJ. Enabling public verifiability and data dynamics for storage security in cloud computing. In:Backes M, Ning P, eds. Proc. of the Computer Security (ESORICS 2009). LNCS 5789, Berlin:Springer-Verlag, 2009. 355-370.[doi:10.1007/978-3-642-04444-1_22]
    [4] Wang C, Wang Q, Ren K, Lou WJ. Privacy-preserving public auditing for data storage security in cloud computing. In:Proc. of the 2010 IEEE INFOCOM. IEEE, 2010. 1-9.[doi:10.1109/INFCOM.2010.5462173]
    [5] Hao Z, Zhong S, Yu NH. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. on Knowledge & Data Engineering, 2011,23(9):1432-1437.[doi:10.1109/TKDE.2011.62]
    [6] Yu Y, Au MH, Mu Y, Tang SH, Ren J, Susilo W, Dong LJ. Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int'l Journal of Information Security, 2015,14(4):307-318.[doi:10.1007/s10207-014-0263-8]
    [7] Yu Y, Zhang YF, Ni JB, Au MH, Chen LX, Liu HY. Remote data possession checking with enhanced security for cloud storage. Future Generation Computer Systems, 2015,52:77-85.[doi:10.1016/j.future.2014.10.006]
    [8] Yu Y, Ni JB, Au MH, Mu Y, Wang BY, Li H. Comments on a public auditing mechanism for shared cloud data service. IEEE Trans. on Services Computing, 2015,8(6):998-999.[doi:10.1109/TSC.2014.2355201]
    [9] Yu Y, Li YN, Ni JB, Yang GM, Mu Y, Susilo W. Comments on "public integrity auditing for dynamic data sharing with multiuser modification". IEEE Trans. on Information Forensics & Security, 2016,11(3):658-659.[doi:10.1109/TIFS.2015.2501728]
    [10] Yu Y, Xue L, Au MH, Susilo W, Ni JB, Zhang YF, Vasilakos AV, Shen J. Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Generation Computer Systems, 2016,62:85-91.[doi:10.1016/j.future.2016.02.003]
    [11] Yu Y, Au MH, Ateniese G, Huang XY, Susilo W, Dai YS, Min GY. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. on Information Forensics & Security, 2017,12(4):767-778.[doi:10.1109/TIFS. 2016.2615853]
    [12] Wang C, Chow SM, Wang Q, Ren K, Lou WJ. Privacy-preserving public auditing for secure cloud storage. IEEE Trans. on Computers, 2013,62(2):362-375.[doi:10.1109/TC.2011.245]
    [13] Ren ZW, Wang LN, Wu QH, Deng RY. Data dynamics enabled privacy-preserving public batch auditing in cloud storage. Chinese Journal of Electronics, 2014,23(2):297-301.
    [14] Wang HQ. Identity-based distributed provable data possession in multicloud storage. IEEE Trans. on Services Computing, 2015, 8(2):328-340.[doi:10.1109/TSC.2014.1]
    [15] Mao J, Cui J, Zhang Y, Ma HJ, Zhang JH. Collaborative outsourced data integrity checking in multi-cloud environment. In:Yang Q, Yu W, Challal Y, eds. Proc. of the Wireless Algorithms, Systems, and Applications (WASA 2016). LNCS 9798, Berlin:SpringerVerlag, 2016. 511-523.[doi:10.1007/978-3-319-42836-9_45]
    [16] Liu X, Jiang YJ. Batch auditing for multi-client dynamic data in multi-cloud storage. Int'l Journal of Security & Its Applications, 2014,8(6):197-210.[doi:10.14257/ijsia.2014.8.6.18]
    [17] Zhou FC, Peng S, Xu J, Xu ZF. Identity-based batch provable data possession. In:Chen L, Han J, eds. Proc. of the Provable Security (ProvSec 2016). LNCS 10005, Berlin:Springer-Verlag, 2016. 112-129.[doi:10.1007/978-3-319-47422-9_7]
    [18] He K, Huang CH, Wang JH, Zhou H, Chen X, Lu YL, Zhang LZ, Wang B. An efficient public batch auditing protocol for data security in multi-cloud storage. In:Proc. of the 8th Chinagrid Conf. IEEE, 2013. 51-56.[doi:10.1109/ChinaGrid.2013.13]
    [19] Shin S, Kim S, Kwon T. Identification of corrupted cloud storage in batch auditing for multi-cloud environments. In:Khalil I, Neuhold E, Tjoa A, Xu L, You I, eds. Proc. of the Information and Communication Technology-EurAsia Conf. (ICT-EurAsia 2015). LNCS 9357, Berlin:Springer-Verlag, 2015. 221-225.[doi:10.1007/978-3-319-24315-3_22]
    [20] https://crypto.stanford.edu/pbc/
    [21] https://gmplib.org/
    [22] https://certivox.org/display/EXT/MIRACL
    [23] Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D. Remote data checking using provable data possession. ACM Trans. on Information & System Security, 2011,14(1):No.12.[doi:10.1145/1952982.1952994]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

庞晓琼,王田琪,陈文俊,任孟琦.一个支持错误定位的批处理数据拥有性证明方案.软件学报,2019,30(2):362-380

Copy
Share
Article Metrics
  • Abstract:3234
  • PDF: 4076
  • HTML: 1593
  • Cited by: 0
History
  • Received:June 14,2017
  • Revised:August 07,2017
  • Online: April 16,2018
You are the first2044630Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063