Secuirty storage in the Cloud Computing: A RSA-based assumption data integrity check without original data

Data integrity is data that has a complete or whole structure. All characteristics of the data including business rules, rules for how pieces of data relate, dates, definitions and lineage must be correct for data to be complete. Data integrity check is an important way to ensure data integrity. In Cloud Computing, the management of the data and services may not be fully trustworthy. It brings in many new security challenges, such that it has become crucial for an archive service to be capable of providing evidence to demonstrate the integrity of data stored in it. In this paper, we study the problem of ensuring the integrity of data storage in Cloud Computing. And a new data integrity check scheme is proposed based on the well-known RSA security assumption. The obvious advantage of our scheme is that the client did not need to keep the copy data in the client. So it indeed relieves the storage burden in client.

[1]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[2]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[3]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[4]  Michael K. Reiter,et al.  Space-Efficient Block Storage Integrity , 2005, NDSS.

[5]  Ran Canetti,et al.  The random oracle methodology, revisited , 2000, JACM.

[6]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[7]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[8]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[9]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[10]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[11]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.

[12]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[13]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[14]  Jia Xu,et al.  Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.

[15]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[16]  Moni Naor,et al.  The complexity of online memory checking , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[17]  J. Maxwell A Treatise on Electricity and Magnetism , 1873, Nature.