Abstract
Recently, cloud computing is the fundamental change happening in the field of Information Technology. In SaaS (software as a service) model, both applications software and databases will be deployed to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Many storage systems rely on replicas to increase the availability and durability of data, but secure replicas storage brings about many new security challenges. In this paper, based on multi-tenancy data-sharing storage model, we propose an integrity verification scheme which allows a third party auditor (TPA) to verify the integrity of multiple replicas stored in clouds through random sampling and periodic verification. In particular, via the double-layer authenticating construction, we achieve the isolation of different tenants’ replicas and dynamic data operations. Extensive performance analysis about sampling in different conditions shows correctness of the proposed scheme in this paper.
The research is supported by the Natural Science Foundation of Shandong Province of China under Grant No.ZR2010FQ026, No.2009ZRB019YT, the Key Technology R&D Program of Shandong Province under Grant No.2010GGX10105, the Independent Innovation Foundation of Shandong University under Grant No.2012TS074.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 17th IEEE International Workshop on Quality of Service (IWQoS 2009), pp. 1–9. IEEE Press, New York (2009)
Bowers, K., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009), pp. 187–198. ACM, New York (2009)
Zhu, Y., Wang, H., Hu, Z., Ahn, G., Hu, H., Yau, S.: Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds. In: The 26th Symposium On Applied Computing, pp. 1550–1556. ACMSAC, Taiwan (2011)
Shi, Y., Zhang, K., Li, Q.: A New Data Integrity Verification Mechanism for SaaS. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) WISM 2010. LNCS, vol. 6318, pp. 236–243. Springer, Heidelberg (2010)
Shi, Y., Zhang, K., Li, Q.: Meta-data Driven Data Chunk Based Secure Data Storage for SaaS. International Journal of Digital Content Technology and its Applications 5, 173–185 (2011)
Pinkas, B., Shulman-Peleg, A., Halevi, S., Harnik, D.: Proofs of ownership in remote storage systems. Cryptology ePrint Archive, Report 2011/207 (2011)
Xiao, D., Yang, Y., Yao, W., Wu, C., Liu, J., Yang, Y.: Multiple-File Remote Data Checking for cloud storage. Computers and Security 31(2), 192–205 (2012)
Juels, A., Kaliski Jr., B.: PORs: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS 2007), pp. 584–597. ACM, New York (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CSS 2007), pp. 598–609. ACM, New York (2007)
Reza, C., Osama, K., Randal, B., Giuseppe, A.: MR-PDP: Multiple-Replica Provable Data Possession. In: The 28th International Conference on Distributed Computing Systems, pp. 411–420. IEEE Press, Beijing (2008)
Xian, H., Feng, D.: An Integrity Checking Scheme in Outsourced Database Model. Journal of Computer Research and Development 47(6), 1107–1115 (2010)
Merkle, R.C.: Protocols for public key cryptosystems. In: Proc. of IEEE Symposium on Security and Privacy, pp. 122–134. IEEE Computer Society, Washington (1980)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, L., Li, Q., Shi, Y., Li, L., He, W. (2012). An Integrity Verification Scheme for Multiple Replicas in Clouds. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds) Web Information Systems and Mining. WISM 2012. Lecture Notes in Computer Science, vol 7529. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33469-6_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-33469-6_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33468-9
Online ISBN: 978-3-642-33469-6
eBook Packages: Computer ScienceComputer Science (R0)