MF-PDP: Multi-function provable data possession scheme in cloud computing

This paper proposed a multi-function provable data possession (MF-PDP), which supports public verification, data dynamic, unlimited times verification and sampling verification. The detail design is provided and the theory analysis about the correctness, security and performance are also described. The experiment emulation and compare analysis suggest the feasibility and advantage.

[1]  Mihir Bellare,et al.  The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols , 2004, CRYPTO.

[2]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .

[3]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[4]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[5]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[6]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[7]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[8]  X. U. Chun-xiang,et al.  Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing , 2012, IACR Cryptol. ePrint Arch..

[9]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[10]  Yalin Chen,et al.  Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage" , 2014, IACR Cryptol. ePrint Arch..

[11]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[12]  Reza Curtmola,et al.  Robust Dynamic Provable Data Possession , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[13]  Gary L. Miller,et al.  Riemann's Hypothesis and tests for primality , 1975, STOC.

[14]  R. Subramanian,et al.  RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence , 2012, Int. J. Cloud Comput..

[15]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[16]  Stephen S. Yau,et al.  Efficient provable data possession for hybrid clouds , 2010, CCS '10.

[17]  Dong Hoon Lee,et al.  PKIS: practical keyword index search on cloud datacenter , 2011, EURASIP J. Wirel. Commun. Netw..

[18]  Chunxiang Xu,et al.  Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing , 2012, ICICA.

[19]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.