Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 614375, 8 pages
http://dx.doi.org/10.1155/2015/614375
Research Article

A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

1Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
2Shandong Provincial Key Laboratory of Computer Network, Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan 250014, China
3University of International Business and Economics, Beijing 100029, China

Received 17 September 2014; Accepted 24 December 2014

Academic Editor: Florin Pop

Copyright © 2015 Lingwei Song et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Y. Zhu, H. Hu, G. J. Ahn et al., “Collaborative integrity verification in hybrid clouds,” in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom '11), pp. 191–200, IEEE, 2011.
  2. T. Velte, A. Velte, and R. Elsenpeter, Cloud Computing: A Practical Approach, chapter 7, McGraw-Hill, New York, NY, USA, 1st edition, 2010.
  3. D. Hubbard and M. Sutton, “Top Threats to Cloud Computing V1.0, Cloud Security Alliance,” 2010, https://cloudsecurityalliance.org/research/top-threats/.
  4. M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, “A cooperative internet backup scheme,” in Proceedings of the Annual Conference on USENIX Annual Technical Conference, pp. 29–41, 2003.
  5. Y. Deswarte, J. Quisquater, and A. Saidane, “Remote integrity checking,” in Integrity and Internal Control in Information Systems VI: IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland, vol. 140 of IFIP International Federation for Information Processing, pp. 1–11, 2004. View at Publisher · View at Google Scholar
  6. M. Naor and G. N. Rothblum, “The complexity of online memory checking,” Journal of the ACM, vol. 56, no. 1, article 2, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Juels and B. S. Kaliski Jr., “Pors: proofs of retrie vability for large files,” in Proceedings of the ACM Conference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds., pp. 584–597, 2007.
  8. S. J. Thomas Schwarz and E. L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” in Proceedings of the 26th IEEE Internationa Conference on Distributed Computing Systems (ICDCS '06), p. 12, July 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating data possession and uncheatable data transfer,” IACR Cryptology ePrint archive, 2006.
  10. F. Sebé, J. Domingo-Ferrer, A. Martínez-Ballesté, Y. Deswarte, and J.-J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1034–1038, 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. G. Yamamoto, S. Oda, and K. Aoki, “Fast integrity for large data,” in Proceedings of the ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption, pp. 21–32, June 2007.
  12. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, “Auditing to keep online storage services honest,” in Proceedings of the 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS '07), G. C. Hunt, Ed., 2007.
  13. G. Ateniese, R. Burns, R. Curtmola et al., “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–610, ACM, New York, NY, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 2008, vol. 5350 of Lecture Notes in Computer Science, pp. 90–107, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  16. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm '08), pp. 1–10, ACM, Istanbul, Turky, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 213–222, New York, NY, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Zhu, G.-J. Ahn, H. Hu, S. S. Yau, H. G. An, and C.-J. Hu, “Dynamic audit services for outsourced storages in clouds,” IEEE Transactions on Services Computing, vol. 6, no. 2, pp. 227–238, 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. H. Wang, “Proxy provable data possession in public clouds,” IEEE Transactions on Services Computing, vol. 6, no. 4, pp. 551–559, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Wang, “Identity-based distributed provable data possession in multi-cloud storage,” IEEE Transactions on Services Computing, 2014. View at Publisher · View at Google Scholar
  24. X. Chen, X. Huang, J. Li, J. Ma, W. Lou, and D. S. Wong, “New algorithms for secure outsourcing of large-scale systems of linear equations,” IEEE Transactions on Information and Forensics Security, vol. 10, no. 1, pp. 69–78, 2015. View at Publisher · View at Google Scholar
  25. D. Zhao, H. Peng, L. Li, and Y. Yang, “A secure and effective anonymous authentication scheme for roaming service in global mobility networks,” Wireless Personal Communications, vol. 78, no. 1, pp. 247–269, 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, “Certificateless remote anonymous authentication schemes for wireless body area networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332–342, 2014. View at Publisher · View at Google Scholar · View at Scopus