吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (增刊1): 295-299.

Previous Articles     Next Articles

Verifiable method for remote data integrity supporting different granular operation

CHEN Long1,2, LI Jun-zhong1   

  1. 1. Institute of Computer Forensics, Chongqing University of Posts and Telecommunications, Chongqing 400065, China;
    2. Chongqing Key Laboratory of Computational Intelligence, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
  • Received:2012-03-10 Online:2012-09-01 Published:2012-09-01

Abstract: Data security and privacy protection are big challenges of the cloud computing.Different operations in public auditing scheme,such as data communication,data storage,integrity and availability checking,dynamic data,data signature have different demands on the data granularity.The paper proposes an integrity checking scheme with different granular operation.In the proposed scheme,the data is divided into three different granularities insisting of block,sub-block and basic block.The scheme supports public auditability and data block dynamics.The performances of the communication and storage as well as the security are analyzed.The results show that our scheme is efficient and secure.

Key words: computer application, remote data security, data integrity, cloud computing, public auditability

CLC Number: 

  • TP393
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1): 71-83. Feng Deng-guo,Zhang Min,Zhang Yan,et al.Study on cloud computing security[J].Journal of Software,2011,22(1): 71-83.

[2] 陈龙,王国胤.有限域上高效的细粒度数据完整性检验方法[J].计算机学报,2011,34(5): 847-855. Chen Long,Wang Guo-yin.An efficient integrity check method for fine-grained data over galois field[J].Chinese Journal of Computers,2011,34(5): 847-855.

[3] Ari Juels,Burton S Kaliski.PORs: Proofs of retrievability for large files[C]//in Proc.of CCS'07.New York,NY,USA: ACM,2007:584–597.

[4] Wang Qian,Wang Cong,Ren Kui,et al.Enabling public auditability and data dynamics for storage security in cloud computing[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(5): 847-859.

[5] Shacham H,Waters B.Compact proofs of retrieva-bility[J].Advances in Cryptology Asiacrypt,2008,LNCS 5350:90-107.

[6] Wang Cong,Wang Qian,Ren Kui,et al.Privacy-preserving public auditing for data storage security in cloud computing[C]//InfoCom2010,IEEE,2010.

[7] Chris Erway C,Alptekin Küpçü,Charalampos Papamanthou,et al.Dynamic provable data possession[C]//Proc of CCS'09.Chicago,IL: ACM,2009: 213-222.

[8] Merkle R C.Protocols for public key cryptosyste-ms[C]//Proc of IEEE Symposium on Security and Privacy'80,1980:122-133.

[9] Boneh D,Lynn B,Shacham H.Short signatures from the weil Pairing[C]//Proc of Cryptology Asiacrypt'2001.London,UK: Springer-Verlag,2001: 514-532.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!