Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016, Article ID 9267608, 6 pages
http://dx.doi.org/10.1155/2016/9267608
Research Article

A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China

Received 24 February 2016; Accepted 25 July 2016

Academic Editor: Yuqiang Wu

Copyright © 2016 Laicheng Cao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D.-G. Feng, M. Zhang, Y. Zhang, and Z. Xu, “Study on cloud computing security,” Journal of Software, vol. 22, no. 1, pp. 71–88, 2011. View at Publisher · View at Google Scholar
  2. P. Mell and T. Grane, The NIST Cloud Computing Definition, NIST Special, New York, NY, USA, 2011.
  3. J. Yang, H. Wang, J. Wang et al., “Provable data possession of resource constrained mobile devices in cloud computing,” Journal of Networds, vol. 6, no. 7, pp. 1033–1040, 2011. View at Google Scholar
  4. A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: a survey,” Future Generation Computer Systems, vol. 29, no. 5, pp. 1278–1299, 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. Q. Wang, C. Wang, J. Li et al., “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proceedings of the 14th European Conference on Research in Computer Security (ESORICS '09), pp. 355–370, Springer, 2009.
  6. D. L. G. Filho and P. S. L. M. Baretto, “Demonstrating data possession and uncheatable data transfer,” in IACR Eprint Archive, International Association for Cryptologic Research, 2006. View at Google Scholar
  7. A. Juels and B. S. Kaliski Jr., “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 584–597, Alexandria, Va, SA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Ateniese, R. Burns, R. Curtmola et al., “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–609, ACM, Scottsdale, Ariz, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. Z.-D. Shen, C. Lin, and Q. Tong, “A method for lightweight verification on data integrity in mobile cloud computing environment,” Journal of Northeastern University, vol. 36, no. 11, pp. 1563–1566, 2015. View at Publisher · View at Google Scholar · View at Scopus
  10. L. Yan, R.-H. Shi, H. Zhong, J. Cui, S. Zhang, and Y. Xu, “Integrity checking protocol with identity-based proxy signature in mobile cloud computing,” Journal on Communications, vol. 36, no. 10, pp. 278–286, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Xiulong, A Data Integrity Verification Scheme Suitable for Mobile Cloud Computing Environment: Design and Prototype Implementation, JILIN University, Jilin, China, 2014.
  12. D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the Weil pairing,” in Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings, vol. 2248 of Lecture Notes in Computer Science, pp. 514–532, Springer, London, UK, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  13. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. R. Merkle, Security, Authentication, and Public Key Systems, UMI Research, Stanford, Calif, USA, 1982.