Remote data integrity check for remotely acquired and stored stream data

Numerous sensors have been deployed to monitor processes or environments in various fields. These sensors produce stream data that are difficult to store in a central storage area owing to network bandwidth constraints and the massive amounts of storage necessary. Thus, it is sometimes efficient to store these data using remote storage services. However, integrity concerns arise when data are stored in remote storage. This paper presents a new integrity check method for remotely acquired and stored stream data. The proposed method uses a secure data acquisition and signature extraction module to produce integrity check metadata for the stream data. To share encryption keys used in signature generation and exchange messages like signatures, the module establishes a secure communication channel with the verifier that checks the integrity of the remote data. The signatures are the metadata of data records, which are used for integrity verification. Signatures for each data record are generated by a chain hash technique, but only some of them are kept in the signature store. The proposed method can successfully detect losses and modifications for remotely acquired and collected stream data.

[1]  Jia Xu,et al.  Remote Integrity Check with Dishonest Storage Server , 2008, ESORICS.

[2]  Yi Mu,et al.  Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage , 2014, International Journal of Information Security.

[3]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[4]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[5]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[6]  Yi Mu,et al.  On Indistinguishability in Remote Data Integrity Checking , 2015, Comput. J..

[7]  Reza Curtmola,et al.  Remote data checking for network coding-based distributed storage systems , 2010, CCSW '10.

[8]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[9]  Shriniwas Gadage,et al.  Cooperative Provable Data possession for integrity verification in multicloud , 2015 .

[10]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[11]  A. Menezes An Introduction to Pairing-Based Cryptography , 2005 .

[12]  Ninghui Li,et al.  Introduction to special section SACMAT'08 , 2011, TSEC.

[13]  Jean-Jacques Quisquater,et al.  Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.

[14]  William Stallings,et al.  Cryptography and network security , 1998 .

[15]  Allen Roginsky,et al.  Report on Pairing-based Cryptography , 2015, Journal of research of the National Institute of Standards and Technology.

[16]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.

[17]  Hong Jiang,et al.  Full integrity and freshness for cloud data , 2018, Future Gener. Comput. Syst..

[18]  A. S. Poornima,et al.  A Survey on Data Integrity Methods in Cloud Storage , 2016, European Journal of Engineering and Technology Research.

[19]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[20]  Ratna Dutta,et al.  Pairing-based cryptography : A survey , 2004 .

[21]  T. Sander,et al.  Audit-log integrity using redactable signatures with pseudonyms , 2006 .

[22]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[23]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.