This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Proxy Provable Data Possession in Public Clouds
Oct.-Dec. 2013 (vol. 6 no. 4)
pp. 551-559
Huaqun Wang, Dalian Ocean University, Dalian and Xidian University Xi'an
Recently, cloud computing rapidly expands as an alternative to conventional computing due to it can provide a flexible, dynamic and resilient infrastructure for both academic and business environments. In public cloud environment, the client moves its data to public cloud server (PCS) and cannot control its remote data. Thus, information security is an important problem in public cloud storage, such as data confidentiality, integrity, and availability. In some cases, the client has no ability to check its remote data possession, such as the client is in prison because of committing crime, on the ocean-going vessel, in the battlefield because of the war, and so on. It has to delegate the remote data possession checking task to some proxy. In this paper, we study proxy provable data possession (PPDP). In public clouds, PPDP is a matter of crucial importance when the client cannot perform the remote data possession checking. We study the PPDP system model, the security model, and the design method. Based on the bilinear pairing technique, we design an efficient PPDP protocol. Through security analysis and performance analysis, our protocol is provable secure and efficient.
Index Terms:
Cloud computing,Protocols,Public key,Computational modeling,Indexes,bilinear pairings,Cloud computing,PPDP,integrity checking,provable security
Citation:
Huaqun Wang, "Proxy Provable Data Possession in Public Clouds," IEEE Transactions on Services Computing, vol. 6, no. 4, pp. 551-559, Oct.-Dec. 2013, doi:10.1109/TSC.2012.35
Usage of this product signifies your acceptance of the Terms of Use.