Efficient integrity verification of replicated data in cloud computing system

The data owner uses the FHE algorithm to generate multiple data replicas.The scheme supports data block dynamic operation.The cloud server cannot cheat the data owner.The scheme supports the third party public validation.The authorized users can access the copies from the CSPs using a single secret key. Data owners can outsource their data to remote Cloud Servers (CSs) and enjoy on-demand high quality services. They rent Cloud Service Provider (CSP) facilities to store unlimited data by paying fees metered by month or gigabyte. For important sensitive data, data owners have increased availability, scalability and durability requirements. If the sensitive data hold these properties and can be stored correctly, the data owners will get great benefits. Thus, the data owners care about the confidentiality aspects as well. Therefore, they may store data replicas on multiple servers across multiple data centers. Data owners should have assurances that the stored copies are consistent with the most recent version updated by the data owner. This research proposed an efficient multi-copy Provable Data Possession (PDP) scheme that holds five characteristics: 1) the data owner uses the Fully Homomorphic Encryption (FHE) to generate data block replicas; 2) the scheme allows the data owner to perform dynamic update operations on the stored data blocks; 3) CSP cannot cheat the data owner; 4) the scheme supports the third party public verification; 5) authorized users can seamlessly access data copies from CSPs using a single secret key. The security analysis and experimental results demonstrate the proposed scheme could resist forge attack, replay attack and replace attack, and perform better than previous effors.

[1]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[2]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[3]  Xiaohua Jia,et al.  Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.

[4]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[5]  Elisa Bertino,et al.  Single-Database Private Information Retrieval from Fully Homomorphic Encryption , 2013, IEEE Transactions on Knowledge and Data Engineering.

[6]  Jean-Jacques Quisquater,et al.  Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.

[7]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[8]  M. Anwar Hasan,et al.  On Verifying Dynamic Multiple Data Copies over Cloud Servers , 2011, IACR Cryptol. ePrint Arch..

[9]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[10]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.

[11]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[12]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[13]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[14]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[15]  Josep Domingo-Ferrer,et al.  Identity-based remote data possession checking in public clouds , 2014, IET Inf. Secur..

[16]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[17]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[18]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[19]  Ke Zeng,et al.  Publicly Verifiable Remote Data Integrity , 2008, ICICS.

[20]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[21]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.

[22]  Stanislaw Jarecki,et al.  Cryptographic Primitives Enforcing Communication and Storage Complexity , 2002, Financial Cryptography.

[23]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[24]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.