05-09-2012, 04:01 PM
ENSURING THE DATA INTEGRITY IN CLOUD DATA STORAGE
1ENSURING THE DATA.pdf (Size: 112.3 KB / Downloads: 63)
Abstract
Along with variant advantages, the cloud storage
gained great attention from both industry and
academics since 2007. However, it also brings new
challenges in creating a secure and reliable data
storage and access facility over insecure or
unreliable service providers. The integrity of data
stored in the cloud is one of the challenges to be
addressed before the novel storage model is
applied widely. In this paper, we propose a remote
data integrity checking protocol based on HLAs
and RSA signature with the support public
verifiability. The support of public verifiability
makes the protocol very flexible, since the user can
commission the data possession to check the TPA.
Introduction
As a novel storage model, cloud storage has gained
great attentions from both the academics and the
industrial communities. However, along with
variant advantages, it also brings new challenges in
creating security and reliable data storage and
access facility. The integrity of the data stored in
the cloud is one of challenges to be addressed
before the cloud storage is applied widely.
Recently, many protocols of ensuring the remote
data integrity have been proposed by the following
research works [1]–[5]. Although these protocols
can be useful to ensure the storage correctness
without having user’s possessing data, they can not
address all the security threats in cloud data
storage, since they are all focused on single server
scenario and most of them do not consider
dynamic data operations. As a complementary
approach, researchers have also proposed
distributed protocols [6]–[8] for ensuring storage
correctness across multiple servers or peers.
Moreover, none of these methods distributed
schemes are aware of dynamic data operations. As
a result, the applicability in cloud data storage can
be drastically limited.
Support for data dynamics
In Cloud Storage, outsourced data might not only
be accessed by the users, but also updated
frequently by users for various application
purposes [5] [9] [15][16].Therefore, supporting
data dynamics for privacy-preserving public
auditing is also of paramount importance. Just as
[14]analysis we can build upon the existing work
[9] to complete our main scheme to support data
dynamics, including block level operations of
modification, deletion and insertion.
Conclusions
In this paper a new protocol which support remote
data possession checking is proposed. The
proposed protocol is based on HLAs and RSA
construction , which make the data integrity is
highly improved. The proposed protocol support
public verifiability, which makes it very flexible.
Security analysis shows that the proposed protocol
is security against server, and also preserves the
file privacy against the third-party auditor, so it is
very suitable for cloud storage systems.