PADP: A parallel data possession audit model for cloud storage

Data security and integrity problems are the most important issues that customers of cloud storage need to concern. In this paper, we propose a parallel audit model for data possession (PADP) in distributed cloud storage environment. The model utilizes the virtues of both a provable data possession (PDP) model and a data possession audit (DPA) model, and adopts a third-party auditor to separate users from storage service providers(SSP).Through adding the audit log mechanism, it can significantly reduce the storage and computation overhead of data possession audit(DPA) on the basis of fully ensuring the safety of audit process. Moreover, according to the characteristics of parallel computing in cloud storage environment, we propose a data possession prove algorithm called MapReduce-based Parallel Challenge Proof Generation Algorithm(MR_PCPGA) by improving the data possession prove algorithm based on homomorphic label in PDP model. Extensive security analysis and experimental results show the proposed schemes are provably secure and highly efficient in distributed cloud storage environment.

[1]  Brian Hayes,et al.  What Is Cloud Computing? , 2019, Cloud Technologies.

[2]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[3]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[4]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[5]  Kang Chen,et al.  Cloud Computing: System Instances and Current Research: Cloud Computing: System Instances and Current Research , 2010 .

[6]  Hal R. Varian,et al.  Designing the perfect auction , 2008, CACM.

[7]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[8]  Shuai Han,et al.  Ensuring data storage security through a novel third party auditor scheme in cloud computing , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[9]  Kun Zhang,et al.  A New Data Integrity Verification Mechanism for SaaS , 2010, WISM.

[10]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[11]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[12]  Stephen S. Yau,et al.  Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.

[13]  Jonathan Katz,et al.  Proofs of Storage from Homomorphic Identification Protocols , 2009, ASIACRYPT.