• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
Citation: Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.

Proofs of Data Possession of Multiple Copies

More Information
  • Published Date: July 14, 2014
  • Cloud storage services have quickly gained enormous popularity. They offer great convenience for data storage and sharing. However, since all user data are kept on remote servers and out of user’s control, user may concern about data status. In order to expand storage service, data integrity verification is one of the critical security requirements for cloud storage service to fulfill. In order to verify the integrity status of files on remote cloud servers, many mechanisms have been proposed, such as PDP and POR. However, these methods can only ensure that the remote server holds ONE COPY of user data correctly. In fact, user needs to make sure that there are multiple copies kept on remote servers, incase that the corrupted file parts could not be recovered with a right copy. In this paper, we propose a multi-copy integrity checking scheme, which enables user to verify that HOW MANY COPIES are actually correct in the server. And this scheme could also identify the corrupted file blocks, thus to guide data recovery. Experimental results show that it has better performance comparing with the one copy schemes, owing to the distributing computations to multiple servers.
  • Related Articles

    [1]Duan Wenxue, Hu Ming, Zhou Qiong, Wu Tingming, Zhou Junlong, Liu Xiao, Wei Tongquan, Chen Mingsong. Reliability in Cloud Computing System: A Review[J]. Journal of Computer Research and Development, 2020, 57(1): 102-123. DOI: 10.7544/issn1000-1239.2020.20180675
    [2]Lou Jungang, Jiang Jianhui, Shen Zhangguo, Jiang Yunliang. Software Reliability Prediction Modeling with Relevance Vector Machine[J]. Journal of Computer Research and Development, 2013, 50(7): 1542-1550.
    [3]Wu Caihua, Liu Juntao, Peng Shirui, Li Haihong. Deriving Markov Chain Usage Model from UML Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1811-1819.
    [4]Li Haifeng, Li Qiuying, and Lu Minyan. Software Reliability Modeling with Logistic Test Coverage Function[J]. Journal of Computer Research and Development, 2011, 48(2): 232-240.
    [5]Mu Fei, Xue Wei, Shu Jiwu, and Zheng Weimin. An Analytical Model for Large-Scale Storage System with Replicated Data[J]. Journal of Computer Research and Development, 2009, 46(5): 756-761.
    [6]Zhang Hongcan, Xue Wei, and Shu Jiwu. An Expandable Distributed RAID Storage Cluster System[J]. Journal of Computer Research and Development, 2008, 45(4): 741-746.
    [7]Ren Xiaoxi, Li Renfa, Jin Shengzhen, Zhang Kehuan, Wu Qiang. Research on Reliability of a Reconfigurable Data Processing System Based on JBits[J]. Journal of Computer Research and Development, 2007, 44(4): 722-728.
    [8]Zhou Xuehai, Yu Jie, Li Xi, and Wand Zhigang. Research on Reliability Evaluation of Cache Based on Instruction Behavior[J]. Journal of Computer Research and Development, 2007, 44(4): 553-559.
    [9]Zhao Jing, Liu Hongwei, Cui Gang, and Yang Xiaozong. A Software Reliability Growth Model Considering Testing Environment and Actual Operation Environment[J]. Journal of Computer Research and Development, 2006, 43(5): 881-887.
    [10]Zhao Jing, Liu Hongwei, Cui Gang, and Yang Xiaozong. A Software Reliability Growth Model Considering Differences Between Testing and Operation[J]. Journal of Computer Research and Development, 2006, 43(3): 503-508.

Catalog

    Article views (1055) PDF downloads (1016) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return