• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
Citation: Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.

Proofs of Data Possession of Multiple Copies

More Information
  • Published Date: July 14, 2014
  • Cloud storage services have quickly gained enormous popularity. They offer great convenience for data storage and sharing. However, since all user data are kept on remote servers and out of user’s control, user may concern about data status. In order to expand storage service, data integrity verification is one of the critical security requirements for cloud storage service to fulfill. In order to verify the integrity status of files on remote cloud servers, many mechanisms have been proposed, such as PDP and POR. However, these methods can only ensure that the remote server holds ONE COPY of user data correctly. In fact, user needs to make sure that there are multiple copies kept on remote servers, incase that the corrupted file parts could not be recovered with a right copy. In this paper, we propose a multi-copy integrity checking scheme, which enables user to verify that HOW MANY COPIES are actually correct in the server. And this scheme could also identify the corrupted file blocks, thus to guide data recovery. Experimental results show that it has better performance comparing with the one copy schemes, owing to the distributing computations to multiple servers.
  • Related Articles

    [1]Li Yuan, Yang Sen, Sun Jing, Zhao Huiqun, Wang Guoren. Influential Cohesive Subgraph Discovery Algorithm in Dual Networks[J]. Journal of Computer Research and Development, 2023, 60(9): 2096-2114. DOI: 10.7544/issn1000-1239.202220337
    [2]Li Xin, Liu Guiquan, Li Lin, Wu Zongda, Ding Junmei. Circle-Based and Social Connection Embedded Recommendation in LBSN[J]. Journal of Computer Research and Development, 2017, 54(2): 394-404. DOI: 10.7544/issn1000-1239.2017.20150788
    [3]Yuan Xinpan, Long Jun, Zhang Zuping, Luo Yueyi, Zhang Hao, and Gui Weihua. Connected Bit Minwise Hashing[J]. Journal of Computer Research and Development, 2013, 50(4): 883-890.
    [4]Jiao Jian, Yao Shan, Li Xiaojian. Research on Network Bidirectional Topology Discovery Based on Measurer by Spreading[J]. Journal of Computer Research and Development, 2010, 47(5): 903-910.
    [5]Jin Xin, Xiong Yan, Li Min, and Yue Lihua. A Connectible-Cell Based Topology Control Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(2): 217-226.
    [6]Liu Wei, Cui Li, Huang Changcheng. EasiFCCT:A Fractional Coverage Algorithm for Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 196-204.
    [7]Yang Liu, Li Zhenyu, Zhang Dafang, Xie Gaogang. Topology Discovery with Smallest-Redundancy in IPv6[J]. Journal of Computer Research and Development, 2007, 44(6): 939-946.
    [8]Sun Yantao, Shi Zhiqiang, Wu Zhimei. Automatic Discovery of Physical Topology in Switched Ethernets[J]. Journal of Computer Research and Development, 2007, 44(2): 208-215.
    [9]Zhu Pengfei, Dai Yingxia, and Bao Xuhua. PKI-Based Mutual Connections Constrained with Discrepancy of Trust Domains[J]. Journal of Computer Research and Development, 2006, 43(10): 1804-1809.
    [10]Wen Yingyou, Zhao Jianli, Zhao Linliang, and Wang Guangxing. A Study of the Relationship Between Performance of Topology-Based MANET Routing Protocol and Network Coverage Density[J]. Journal of Computer Research and Development, 2005, 42(4): 684-689.
  • Cited by

    Periodical cited type(0)

    Other cited types(1)

Catalog

    Article views (1055) PDF downloads (1016) Cited by(1)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return