Identity‐based storage management and integrity verify protocol for secure outsourcing in multi‐cloud

Verifying the integrity of outsourced data is an important issue in cloud storage. Recently, many integrity verify protocols have been proposed that can support the public verifiability, data dynamics, and privacy against verifiers but involve a third‐party auditor's participation. In this work, we propose a novel identity‐based storage management and integrity verify protocol for secure outsourcing in multi‐cloud. From theoretical analysis and a lot of simulation experiments, we show our proposed protocol is secure and efficient, without using any trusted organizer. Furthermore, the protocol enjoys many important security attributes including prevention of various attacks, user anonymity, local password verification, and so on. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[2]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[3]  Moni Naor,et al.  The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[4]  Yixian Yang,et al.  IBC-Based Entity Authentication Protocols for Federated Cloud Systems , 2013, KSII Trans. Internet Inf. Syst..

[5]  Sushil Jajodia,et al.  Integrity and Internal Control in Information Systems VI , 2013, IFIP International Federation for Information Processing.

[6]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[7]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[8]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.

[9]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[10]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[11]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[12]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[13]  Huaqun Wang,et al.  Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.

[14]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[15]  Frank Dürr,et al.  PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing , 2013, Pervasive Mob. Comput..

[16]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.

[17]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[18]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[19]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[20]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[21]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[22]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.