• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
Citation: Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.

Proofs of Data Possession of Multiple Copies

More Information
  • Published Date: July 14, 2014
  • Cloud storage services have quickly gained enormous popularity. They offer great convenience for data storage and sharing. However, since all user data are kept on remote servers and out of user’s control, user may concern about data status. In order to expand storage service, data integrity verification is one of the critical security requirements for cloud storage service to fulfill. In order to verify the integrity status of files on remote cloud servers, many mechanisms have been proposed, such as PDP and POR. However, these methods can only ensure that the remote server holds ONE COPY of user data correctly. In fact, user needs to make sure that there are multiple copies kept on remote servers, incase that the corrupted file parts could not be recovered with a right copy. In this paper, we propose a multi-copy integrity checking scheme, which enables user to verify that HOW MANY COPIES are actually correct in the server. And this scheme could also identify the corrupted file blocks, thus to guide data recovery. Experimental results show that it has better performance comparing with the one copy schemes, owing to the distributing computations to multiple servers.
  • Related Articles

    [1]Liu Linfeng, Yu Zixing, Zhu He. A Link Prediction Method Based on Gated Recurrent Units for Mobile Social Network[J]. Journal of Computer Research and Development, 2023, 60(3): 705-716. DOI: 10.7544/issn1000-1239.202110432
    [2]Jiao Xu, Xiao Yingyuan, Zheng Wenguang, Zhu Ke. Research Progress of Recommendation Technology in Location-Based Social Networks[J]. Journal of Computer Research and Development, 2018, 55(10): 2291-2306. DOI: 10.7544/issn1000-1239.2018.20170489
    [3]Liu Yong, Han Xue, Li Jinbao, Ren Qianqian, Wang Nan. Collaboration Algorithm in Social Networks Based on Tasks with Partial Relation[J]. Journal of Computer Research and Development, 2016, 53(11): 2654-2665. DOI: 10.7544/issn1000-1239.2016.20150617
    [4]Hu Kaixian, Liang Ying, Xu Hongbo, Bi Xiaodi, Zuo Yao. A Method for Social Network User Identity Feature Recognition[J]. Journal of Computer Research and Development, 2016, 53(11): 2630-2644. DOI: 10.7544/issn1000-1239.2016.20150219
    [5]LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341
    [6]Sun Huanliang, Jin Mingyu, Liu Junling, Yu Ge. Methods for Team Formation Problem with Grouping Task in Social Networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2535-2544. DOI: 10.7544/issn1000-1239.2015.20148136
    [7]Lan Mengwei, Li Cuiping, Wang Shaoqing, Zhao Kankan, Lin Zhixia, Zou Benyou, Chen Hong. Survey of Sign Prediction Algorithms in Signed Social Networks[J]. Journal of Computer Research and Development, 2015, 52(2): 410-422. DOI: 10.7544/issn1000-1239.2015.20140210
    [8]Wang Li, Cheng Suqi, Shen Huawei, Cheng Xueqi. Structure Inference and Prediction in the Co-Evolution of Social Networks[J]. Journal of Computer Research and Development, 2013, 50(12): 2492-2503.
    [9]Li Peng, Wang Bin, Shi Zhiwei, Cui Yachao, and Li Hengxun. Tag-TextRank: A Webpage Keyword Extraction Method Based on Tags[J]. Journal of Computer Research and Development, 2012, 49(11): 2344-2351.
    [10]Kang Le, Jing Jiwu, and Wang Yuewu. The Trust Expansion and Control in Social Network Service[J]. Journal of Computer Research and Development, 2010, 47(9): 1611-1621.

Catalog

    Article views (1055) PDF downloads (1016) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return