Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 2948025, 13 pages
Research Article

Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment

1School of Electronic and Information Engineering, Beihang University, Beijing, China
2School of Science, North China University of Technology, Beijing, China
3Guangxi Key Lab of Multi-Source Information Mining & Security, Guilin, China

Correspondence should be addressed to Jianhong Zhang; nc.ude.tucn@gnahzhj

Received 1 April 2017; Accepted 1 October 2017; Published 31 October 2017

Academic Editor: Qing Yang

Copyright © 2017 Jian Mao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing), new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.