Remote Data Authentication Scheme Based Balance Binary Sort Merkle Hash Tree

Now cloud storage has become the preferred way for users to store large amounts of data. In order to verify the integrity of remote data, Merkle hash tree is often used to generate data fingerprints. Aiming at the shortcomings of existing common schemes for remote data authentication based on Merkle hash tree, in this paper, based on data block index number constructs the balance binary sort Merkle hash tree, and using two-layer data nodes to shorten the authentication path. At the same time, by introducing “virtual nodes” to maintain binary sort Merkle tree balance and simplify insertion; In addition, considering the requirements of sensitive information confidentiality, by group hash for sensitive information and non-sensitive information to ensure that sensitive information is not leaked in the verification process. Theoretical analysis shows that the authentication structure can fulfill the function of data integrity audit well, and support the dynamic operation of data blocks while maintaining the balance of Merkle tree.

[1]  Huaqun Wang,et al.  Proxy Provable Data Possession in Public Clouds , 2013, IEEE Transactions on Services Computing.

[2]  Yi Mu,et al.  On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[3]  Yao Ge,et al.  LBT-based cloud data integrity verification scheme , 2016 .

[4]  Xuemin Shen,et al.  An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid , 2014, IEEE Systems Journal.

[5]  Li Zhou-ju An Improved Data Integrity Verification Scheme in Cloud Storage System , 2014 .

[6]  Xizhao Wang,et al.  An On-line Multi-CBR Agent Dispatching Algorithm , 2006, Soft Comput..

[7]  Yang Qiu-xiang Remote attestation mechanism of platform configuration based on dynamic Huffman tree , 2012 .

[8]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[10]  Alexis Bonnecaze,et al.  New models for efficient authenticated dictionaries , 2015, Comput. Secur..

[11]  Yihua Zhang,et al.  Efficient Dynamic Provable Possession of Remote Data via Update Trees , 2016, TOS.

[12]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[13]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[14]  Teng Li,et al.  A position-aware Merkle tree for dynamic cloud data integrity verification , 2015, Soft Computing.

[15]  Jing Zou,et al.  Dynamic Provable Data Possession Based on Ranked Merkle Hash Tree , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[16]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[17]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[18]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[19]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[20]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[21]  Tan Shuan,et al.  Research and Development of Provable Data Integrity in Cloud Storage , 2015 .

[22]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[23]  Xiaofeng Liao,et al.  A Novel Privacy-Preserving Data Integrity Verification by Partial Delegation , 2018, 2018 Eighth International Conference on Information Science and Technology (ICIST).

[24]  David Cash,et al.  Dynamic Proofs of Retrievability via Oblivious RAM , 2013, EUROCRYPT.

[25]  Li Hui,et al.  Secure and Privacy-Preserving Data Storage Service in Public Cloud , 2014 .