期刊文献+

Towards Comprehensive Provable Data Possession in Cloud Computing 被引量:1

Towards Comprehensive Provable Data Possession in Cloud Computing
原文传递
导出
摘要 To check the remote data integrity in cloud computing,we have proposed an efficient and full data dynamic provable data possession(PDP) scheme that uses a SN(serial number)-BN(block number) table to support data block update.In this article,we first analyze and test its performance in detail.The result shows that our scheme is efficient with low computation,storage,and communication costs.Then,we discuss how to extend the dynamic scheme to support other features,including public auditability,privacy preservation,fairness,and multiple-replica checking.After being extended,a comprehensive PDP scheme that has high efficiency and satisfies all main requirements is provided. To check the remote data integrity in cloud computing,we have proposed an efficient and full data dynamic provable data possession(PDP) scheme that uses a SN(serial number)-BN(block number) table to support data block update.In this article,we first analyze and test its performance in detail.The result shows that our scheme is efficient with low computation,storage,and communication costs.Then,we discuss how to extend the dynamic scheme to support other features,including public auditability,privacy preservation,fairness,and multiple-replica checking.After being extended,a comprehensive PDP scheme that has high efficiency and satisfies all main requirements is provided.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第3期265-271,共7页 武汉大学学报(自然科学英文版)
基金 Supported by the National Basic"863"Research Program of China(2012CB315901)
关键词 cloud computing provable data possession data dynamics SN-BN table cloud computing; provable data possession; data dynamics; SN-BN table
  • 相关文献

参考文献17

  • 1Deswarte Y, Quisquater J J, Saidane A. Remote integrity checking [C]//Proceedings of IICIS'03. Berlin: SpringerVerlag, 2003: 1-11.
  • 2Ateniese G, Burns R, Curtmola R, et al. Provable data possession at untrusted stores [C]//Proceedings of ACMCCS'07. New York: ACM Press, 2007: 598-609.
  • 3Juels A, Kaliski B S. Pors: Proofs of retrievability for large files [C]//Proceedings of ACM-CCS'07. New York: ACM Press, 2007: 584-597.
  • 4Ateniese G, Di Pietro R, Mancini L V, et al. Scalable and efficient provable data possession [C]//Proceedings of Secure Comm'08. New York: ACM Press, 2008: 1-10.
  • 5Wang Qian, Wang Cong, Ren Kui, et al. Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transaction on Parallel and Distributed Systems, 2011, 22(5): 847-859.
  • 6Hao Zhuo, Zhong Sheng, Yu Nenghai. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability [J]. IEEE Transaction on Knowledge and Data Engineering, 2011, 23(9): 1432-1437.
  • 7Luo Wenjun, Bai Guojing. Ensuring the data integrity in cloud data storage [C]//Proceedings of CCIS'I1. Buffalo: IEEE Computer Society, 2011: 240-243.
  • 8Wang Cong, Wang Qian, Ren Kui, et al. Privacy-preserving public auditing for data storage security in cloud computing [C]//Proceedings of IEEE INFOCOM' 10. Buffalo: IEEE Computer Society, 2010: 1-9.
  • 9Hao Zhuo, Yu Nenghai. A multiple-replica remote data possession checking protocol with public verifiability [C]// Proceedings of ISDPE' 10. Buffalo: IEEE Computer Society, 2010: 84-89.
  • 10Zhu Yan, Wang Huaixi, Hu Zexing, et al. Dynamic audit services for integrity verification of outsourced storage in clouds [C]//Proceedings of SAC' 11. New York: ACM Press, 2011: 1550-1557.

同被引文献7

引证文献1

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部