• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang. An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics[J]. Journal of Computer Research and Development, 2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509
Citation: Qin Zhiguang, Wang Shiyu, Zhao Yang, Xiong Hu, Wu Songyang. An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics[J]. Journal of Computer Research and Development, 2015, 52(10): 2192-2199. DOI: 10.7544/issn1000-1239.2015.20150509

An Auditing Protocol for Data Storage in Cloud Computing with Data Dynamics

More Information
  • Published Date: September 30, 2015
  • Data integrity checking for cloud storage services has attracted widespread attention from academia and industry recently. However, some issues should be addressed in case the dynamic operations are considered, because the dynamic auditing schemes are vulnerable to replay attacks mounted by the malicious cloud servers, and also cannot support the multi-granular dynamic operations well. This paper proposes a hierarchical auditing protocol for data storage in cloud computing with data dynamics by incorporating the idea of Merkle Hash tree (MHT) and bilinear pairings technology. In this paper, the basic block has been divided into a number of smaller blocks by utilizing the hierarchical index structures, and every leaf of the Merkle Hash Tree is associated with multiple blocks, so our scheme can reduce the length of the Merkle Hash Tree effectively. The proposed scheme can not only meet the security demands of cloud storage services for data integrity, but also support the user to perform multi-granular dynamic operations. In addition, the communication costs of the dynamic operations derived from the user and the auditing operations derived from the auditor have been greatly reduced. Finally, security analysis and performance analysis show that our proposed scheme is secure and efficient.
  • Related Articles

    [1]Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133
    [2]Shen Yuan, Song Wei, Zhao Changsheng, Peng Zhiyong. A Cross-Domain Ciphertext Sharing Scheme Supporting Access Behavior Identity Tracing[J]. Journal of Computer Research and Development, 2024, 61(7): 1611-1628. DOI: 10.7544/issn1000-1239.202330618
    [3]Yang Xiaodong, Zhou Hang, Ren Ningning, Yuan Sen, Wang Caifen. Aggregate Signcryption Scheme Supporting Multi-Ciphertext Equality Test for Wireless Body Area Network[J]. Journal of Computer Research and Development, 2023, 60(2): 341-350. DOI: 10.7544/issn1000-1239.202110775
    [4]Du Ruizhong, Li Mingyue, Tian Junfeng. Multi-keyword Ranked Ciphertext Retrieval Scheme Based on Clustering Index[J]. Journal of Computer Research and Development, 2019, 56(3): 555-565. DOI: 10.7544/issn1000-1239.2019.20170830
    [5]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [6]Zhang Kai, Wei Lifei, Li Xiangxue, Chen Jie, Qian Haifeng. An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security[J]. Journal of Computer Research and Development, 2016, 53(10): 2239-2247. DOI: 10.7544/issn1000-1239.2016.20160430
    [7]Xiao Siyu, Ge Aijun, Ma Chuangui. Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts[J]. Journal of Computer Research and Development, 2016, 53(10): 2207-2215. DOI: 10.7544/issn1000-1239.2016.20160459
    [8]Dong Xiaolei. Advances of Privacy Preservation in Internet of Things[J]. Journal of Computer Research and Development, 2015, 52(10): 2341-2352. DOI: 10.7544/issn1000-1239.2015.20150764
    [9]Zhang Jie, Ge Aijun, Ma Chuangui. Fully Secure Hierarchical Inner Product Encryption with Constant-Size Ciphertexts[J]. Journal of Computer Research and Development, 2015, 52(3): 691-701. DOI: 10.7544/issn1000-1239.2015.20131413
    [10]Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie. CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage[J]. Journal of Computer Research and Development, 2014, 51(7): 1424-1435.

Catalog

    Article views (1584) PDF downloads (985) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return