Advanced Search
    Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
    Citation: Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.

    Proofs of Data Possession of Multiple Copies

    More Information
    • Published Date: July 14, 2014
    • Cloud storage services have quickly gained enormous popularity. They offer great convenience for data storage and sharing. However, since all user data are kept on remote servers and out of user’s control, user may concern about data status. In order to expand storage service, data integrity verification is one of the critical security requirements for cloud storage service to fulfill. In order to verify the integrity status of files on remote cloud servers, many mechanisms have been proposed, such as PDP and POR. However, these methods can only ensure that the remote server holds ONE COPY of user data correctly. In fact, user needs to make sure that there are multiple copies kept on remote servers, incase that the corrupted file parts could not be recovered with a right copy. In this paper, we propose a multi-copy integrity checking scheme, which enables user to verify that HOW MANY COPIES are actually correct in the server. And this scheme could also identify the corrupted file blocks, thus to guide data recovery. Experimental results show that it has better performance comparing with the one copy schemes, owing to the distributing computations to multiple servers.
    • Related Articles

      [1]Xie Qin, Zhang Qinghua, Wang Guoyin. An Adaptive Three-way Spam Filter with Similarity Measure[J]. Journal of Computer Research and Development, 2019, 56(11): 2410-2423. DOI: 10.7544/issn1000-1239.2019.20180793
      [2]Song Jinfeng, Wen Lijie, Wang Jianmin. A Similarity Measure for Process Models Based on Task Occurrence Relations[J]. Journal of Computer Research and Development, 2017, 54(4): 832-843. DOI: 10.7544/issn1000-1239.2017.20151176
      [3]Zhao Yongwei, Zhou Yuan, Li Bicheng. Object Retrieval Based on Enhanced Dictionary and Spatially-Constrained Similarity Measurement[J]. Journal of Computer Research and Development, 2016, 53(5): 1043-1052. DOI: 10.7544/issn1000-1239.2016.20150070
      [4]Wang Shaopeng, Wen Yingyou, Zhao Hong. Similarity Query Processing Algorithm over Data Stream Based on LCSS[J]. Journal of Computer Research and Development, 2015, 52(9): 1976-1991. DOI: 10.7544/issn1000-1239.2015.20140479
      [5]Xiao Yu and Yu Jian. A Weighted Self Adaptive Similarity Measure[J]. Journal of Computer Research and Development, 2013, 50(9): 1876-1882.
      [6]Shen Qingni, Du Hong, Wen Han, Qing Sihan. A Data Sealing Approach Based on Integrity Measurement Architecture[J]. Journal of Computer Research and Development, 2012, 49(1): 210-216.
      [7]Zhu Yangyong, Dai Dongbo, and Xiong Yun. A Survey of the Research on Similarity Query Technique of Sequence Data[J]. Journal of Computer Research and Development, 2010, 47(2): 264-276.
      [8]Xing Chunxiao, Gao Fengrong, Zhan Sinan, Zhou Lizhu. A Collaborative Filtering Recommendation Algorithm Incorporated with User Interest Change[J]. Journal of Computer Research and Development, 2007, 44(2): 296-301.
      [9]Liu Bing, Yan Heping, Duan Jiangjiao, Wang Wei, and Shi Baile. A Bottom-Up Distance-Based Index Tree for Metric Space[J]. Journal of Computer Research and Development, 2006, 43(9): 1651-1657.
      [10]Xiu Yu, Wang Shitong, Wu Xisheng, Hu Dewen. The Directional Similarity-Based Clustering Method DSCM[J]. Journal of Computer Research and Development, 2006, 43(8): 1425-1431.

    Catalog

      Article views (1055) PDF downloads (1016) Cited by()

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return