iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-642-33469-6_36
An Integrity Verification Scheme for Multiple Replicas in Clouds | SpringerLink
Skip to main content

An Integrity Verification Scheme for Multiple Replicas in Clouds

  • Conference paper
Web Information Systems and Mining (WISM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7529))

Included in the following conference series:

Abstract

Recently, cloud computing is the fundamental change happening in the field of Information Technology. In SaaS (software as a service) model, both applications software and databases will be deployed to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Many storage systems rely on replicas to increase the availability and durability of data, but secure replicas storage brings about many new security challenges. In this paper, based on multi-tenancy data-sharing storage model, we propose an integrity verification scheme which allows a third party auditor (TPA) to verify the integrity of multiple replicas stored in clouds through random sampling and periodic verification. In particular, via the double-layer authenticating construction, we achieve the isolation of different tenants’ replicas and dynamic data operations. Extensive performance analysis about sampling in different conditions shows correctness of the proposed scheme in this paper.

The research is supported by the Natural Science Foundation of Shandong Province of China under Grant No.ZR2010FQ026, No.2009ZRB019YT, the Key Technology R&D Program of Shandong Province under Grant No.2010GGX10105, the Independent Innovation Foundation of Shandong University under Grant No.2012TS074.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 17th IEEE International Workshop on Quality of Service (IWQoS 2009), pp. 1–9. IEEE Press, New York (2009)

    Google Scholar 

  3. Bowers, K., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009), pp. 187–198. ACM, New York (2009)

    Chapter  Google Scholar 

  4. Zhu, Y., Wang, H., Hu, Z., Ahn, G., Hu, H., Yau, S.: Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds. In: The 26th Symposium On Applied Computing, pp. 1550–1556. ACMSAC, Taiwan (2011)

    Google Scholar 

  5. Shi, Y., Zhang, K., Li, Q.: A New Data Integrity Verification Mechanism for SaaS. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) WISM 2010. LNCS, vol. 6318, pp. 236–243. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Shi, Y., Zhang, K., Li, Q.: Meta-data Driven Data Chunk Based Secure Data Storage for SaaS. International Journal of Digital Content Technology and its Applications 5, 173–185 (2011)

    Google Scholar 

  7. Pinkas, B., Shulman-Peleg, A., Halevi, S., Harnik, D.: Proofs of ownership in remote storage systems. Cryptology ePrint Archive, Report 2011/207 (2011)

    Google Scholar 

  8. Xiao, D., Yang, Y., Yao, W., Wu, C., Liu, J., Yang, Y.: Multiple-File Remote Data Checking for cloud storage. Computers and Security 31(2), 192–205 (2012)

    Article  Google Scholar 

  9. Juels, A., Kaliski Jr., B.: PORs: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS 2007), pp. 584–597. ACM, New York (2007)

    Chapter  Google Scholar 

  10. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CSS 2007), pp. 598–609. ACM, New York (2007)

    Chapter  Google Scholar 

  11. Reza, C., Osama, K., Randal, B., Giuseppe, A.: MR-PDP: Multiple-Replica Provable Data Possession. In: The 28th International Conference on Distributed Computing Systems, pp. 411–420. IEEE Press, Beijing (2008)

    Google Scholar 

  12. Xian, H., Feng, D.: An Integrity Checking Scheme in Outsourced Database Model. Journal of Computer Research and Development 47(6), 1107–1115 (2010)

    Google Scholar 

  13. Merkle, R.C.: Protocols for public key cryptosystems. In: Proc. of IEEE Symposium on Security and Privacy, pp. 122–134. IEEE Computer Society, Washington (1980)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, L., Li, Q., Shi, Y., Li, L., He, W. (2012). An Integrity Verification Scheme for Multiple Replicas in Clouds. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds) Web Information Systems and Mining. WISM 2012. Lecture Notes in Computer Science, vol 7529. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33469-6_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33469-6_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33468-9

  • Online ISBN: 978-3-642-33469-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics