The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.09 - September (2011 vol.23)
pp: 1432-1437
ABSTRACT
Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third-party auditor. In a previous work, Sebé et al. propose a remote data integrity checking protocol that supports data dynamics. In this paper, we adapt Sebé et al.'s protocol to support public verifiability. The proposed protocol supports public verifiability without help of a third-party auditor. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a formal analysis, we show the correctness and security of the protocol. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance.
INDEX TERMS
protocols, cloud computing, data integrity, data privacy, formal verification, formal analysis, privacy-preserving remote data integrity checking protocol, data dynamics, public verifiability, cloud computing, Sebé et al. protocol, Protocols, Servers, Security, Probabilistic logic, Data privacy, Privacy, Games, privacy., Data integrity, data dynamics, public verifiability
CITATION
"A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability", IEEE Transactions on Knowledge & Data Engineering, vol.23, no. 9, pp. 1432-1437, September 2011, doi:10.1109/TKDE.2011.62
REFERENCES
[1] F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient Remote Data Possession Checking in Critical Information Infrastructures," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
[2] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the Fifth Utility," Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, 2009.
[3] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-609, 2007.
[4] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, "MR-PDP: Multiple-Replica Provable Data Possession," Proc. 28th Int'l Conf. Distributed Computing Systems (ICDCS '08), 2008.
[5] G. Ateniese, R. Di Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth ACM Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '08), 2008.
[6] C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 213-222, 2009.
[7] C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," Proc. 17th Int'l Workshop Quality of Service (IWQoS '09), pp. 1-9, July 2009.
[8] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. 14th European Conf. Research in Computer Security (ESORICS), Sept. 2009.
[9] C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, Mar. 2010.
[10] Y. Deswarte and J.-J. Quisquater, "Remote Integrity Checking," Proc. Sixth Conf. Integrity and Internal Control in Information Systems (IICIS '04), pp. 1-11, 2004.
[11] D.L.G. Filho and P.S.L.M. Barreto, "Demonstrating Data Possession and Uncheatable Data Transfer." Cryptology ePrint Archive, Report 2006/150, http:/eprint.iacr.org/, 2006.
[12] M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, "Auditing to Keep Online Storage Services Honest," Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS), 2007.
[13] C. Wang, S.S.-M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," Cryptology ePrint Archive, Report 2009/579, http:/eprint.iacr.org/, 2009.
[14] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, "Cooperative Provable Data Possession," Cryptology ePrint Archive, Report 2010/234, http:/eprint.iacr.org/, 2010.
[15] Z. Hao and N. Yu, "A Multiple-Replica Remote Data Possession Checking Protocol with Public Verifiability," Proc. Second Int'l Data, Privacy and E-Commerce Symp. (ISDPE '10), 2010.
[16] O. Goldreich, Foundations of Cryptography. Cambridge Univ. Press, 2004.
[17] I. Damgård, "Towards Practical Public Key Systems Secure against Chosen Ciphertext Attacks," Proc. 11th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '91), 1992.
[18] M. Bellare and A. Palacio, "The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols," Proc. Cryptology Conf. Advances in Cryptology (CRYPTO '04), pp. 273-289, 2004.
[19] G.L. Miller, "Riemann's Hypothesis and Tests for Primality," Proc. Seventh Ann. ACM Symp. Theory of Computing (STOC '75), pp. 234-239, 1975.
[20] Z. Hao, S. Zhong, and N. Yu, "A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability," Technical Report 2010-11, SUNY Buffalo CSE Dept., http://www.cse.buffalo.edu/tech-reports2010-11.pdf , 2010.
[21] Multiprecision Integer and Rational Arithmetic C/C++ Library, http:/www.shamus.ie/, 2011.
SEARCH
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool