Research of Data Possession Provability Proving on Cloud Computing

With the rapid development of cloud computing, more and more data to be stored in the cloud storage servers. Cloud storage as a new type of storage services, with high scalability, high reliability, low cost, can be accessed anytime and anywhere features, provides a new model for mass data storage management. However, due to data are outsourcing to a cloud services provider, users are actually relinquishing the ultimate control over the fate of their data, so it faces many challenges. Data possession provability allows cloud users to verify whether their data are still integrally, validly and correctly preserved in Cloud Storage system, and whether they can obtain the data at anytime, anywhere. It is a challenging research problem of cloud storage security. This paper concluded data persistence proving model from some aspects such as general encryption scheme to the data, homomorphic encryption scheme, third-party audit (TPA) and so on. This paper discussed and summarized the existing data persistence proving schemes and models, and concluded a general model based on data persistence proving model of TPA (third-party audits). Keywords-cloud computing;cloud security;data possession provability; third-party audits; homomorphic encryption

[1]  Zhang Chi Review of Cloud Computing Security , 2013 .

[2]  Dawu Gu,et al.  An improved dynamic provable data possession model , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.

[3]  Ke Zeng,et al.  Publicly Verifiable Remote Data Integrity , 2008, ICICS.

[4]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[5]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[6]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[7]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..

[8]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[9]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[10]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[11]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[12]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[13]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[14]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[15]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[16]  Lan-xiang Chen A Homomorphic Hashing Based Provable Data Possession: A Homomorphic Hashing Based Provable Data Possession , 2011 .