• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang. An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics[J]. Journal of Computer Research and Development, 2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509
Citation: Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang. An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics[J]. Journal of Computer Research and Development, 2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509

An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics

More Information
  • Published Date: September 30, 2015
  • Data integrity checking for cloud storage services has attracted widespread attention from academia and industry recently. However, some issues should be addressed in case the dynamic operations are considered, because the dynamic auditing schemes are vulnerable to replay attacks mounted by the malicious cloud servers, and also cannot support the multi-granular dynamic operations well. This paper proposes a hierarchical auditing protocol for data storage in cloud computing with data dynamics by incorporating the idea of Merkle Hash tree (MHT) and bilinear pairings technology. In this paper, the basic block has been divided into a number of smaller blocks by utilizing the hierarchical index structures, and every leaf of the Merkle Hash Tree is associated with multiple blocks, so our scheme can reduce the length of the Merkle Hash Tree effectively. The proposed scheme can not only meet the security demands of cloud storage services for data integrity, but also support the user to perform multi-granular dynamic operations. In addition, the communication costs of the dynamic operations derived from the user and the auditing operations derived from the auditor have been greatly reduced. Finally, security analysis and performance analysis show that our proposed scheme is secure and efficient.
  • Related Articles

    [1]Zhang Qiang, Ye Ayong, Ye Guohua, Deng Huina, Chen Aimin. k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering[J]. Journal of Computer Research and Development, 2022, 59(7): 1625-1635. DOI: 10.7544/issn1000-1239.20210117
    [2]Xu Yuming, Zhu Ningbo, Ouyang Aijia, and Li Kenli. A Double-Helix Structure Genetic Algorithm for Task Scheduling on Heterogeneous Computing Systems[J]. Journal of Computer Research and Development, 2014, 51(6): 1240-1252.
    [3]Hu Xinping, He Yuzhi, Ni Weiwei, and Zhang Yong. A Privacy-Preserving Data Publishing Method Based on Genetic Algorithm with Roulette Wheel[J]. Journal of Computer Research and Development, 2012, 49(11): 2432-2439.
    [4]Shen Haihua, Wang Pengyu, Wei Wenli, Guo Qi. A Coverage Directed Test Generation Platform for Microprocessors Using Genetic Approach[J]. Journal of Computer Research and Development, 2009, 46(10): 1612-1625.
    [5]Song Jinling, Liu Guohua, Huang Liming, Zhu Caiyun. Algorithms to Find the Set of Relevant Views and Quasi-Identifiers for K-Anonymity Method[J]. Journal of Computer Research and Development, 2009, 46(1): 77-88.
    [6]Li Qinghua, Yang Shida, and Ruan Youlin. Improving Optimization for Genetic Algorithms Based on Level Set[J]. Journal of Computer Research and Development, 2006, 43(9): 1624-1629.
    [7]Yi Yeqing, Lin Yaping, Lin Mu, Li Xiaolong, Wang Lei. Blind Source Separation Based on Genetic Algorithm[J]. Journal of Computer Research and Development, 2006, 43(2): 244-252.
    [8]Wang Fei, Liu Dayou, Wang Songxin. Research on Incremental Learning of Bayesian Network Structure Based on Genetic Algorithms[J]. Journal of Computer Research and Development, 2005, 42(9): 1461-1466.
    [9]Han Xuedong, Hong Bingrong, and Meng Wei. An Immune Genetic Algorithm Based on Vaccine Autonomous Obtaining and Updating[J]. Journal of Computer Research and Development, 2005, 42(5): 740-745.
    [10]Zhang Min, Lin Chuan, and Ma Shaoping. Dynamic Parameter Learning Approach for Information Retrieval with Genetic Algorithm[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1584) PDF downloads (985) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return