Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 2948025, 13 pages
https://doi.org/10.1155/2017/2948025
Research Article

Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment

1School of Electronic and Information Engineering, Beihang University, Beijing, China
2School of Science, North China University of Technology, Beijing, China
3Guangxi Key Lab of Multi-Source Information Mining & Security, Guilin, China

Correspondence should be addressed to Jianhong Zhang; nc.ude.tucn@gnahzhj

Received 1 April 2017; Accepted 1 October 2017; Published 31 October 2017

Academic Editor: Qing Yang

Copyright © 2017 Jian Mao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Yu, L. Chen, Z. Cai, H. Shen, Y. Liang, and Y. Pan, “Stochastic Load Balancing for Virtual Resource Management in Datacenters,” IEEE Transactions on Cloud Computing, pp. 1–14, 2016. View at Publisher · View at Google Scholar
  2. L. Yu and Z. Cai, “Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters,” in Proceedings of the 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016, IEEE, San Francisco, CA, USA, April 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. Y. Deswarte, J.-J. Quisquater, and A. Sadane, “Remote integrity checking,” Integrity and Internal Control in Information Systems VI, vol. 140, p. 11, 2004. View at Google Scholar
  4. D. L. Gazzoni Filho and P. S. L. M. Barreto, “Demonstrating data possession and uncheatable data transfer,” Cryptology ePrint Archive, vol. 2006, pp. 150–158, 2006. View at Google Scholar
  5. G. Ateniese, R. Burns, R. Curtmola et al., “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–609, Virginia, Va, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. G. Ateniese, S. Kamara, and J. Katz, “Proofs of storage from homomorphic identification protocols,” in Proceedings of International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, pp. 319–333, Springer-Verlag, London, UK, 2009. View at MathSciNet
  7. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Zhu, H. Hu, G. Ahn, Y. Han, and S. Chen, “Collaborative Integrity Verification in Hybrid Clouds,” in Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 191–200, Miami, Fla, USA, October 2011. View at Publisher · View at Google Scholar
  9. Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu, “Cooperative provable data possession for integrity verification in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. Q. Zheng and S. Xu, “Fair and dynamic proofs of retrievability,” in Proceedings of the first ACM conference on Data and application security and privacy, pp. 237–248, ACM, Tempe, AZ, USA, February 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. J. Mao, J. Cui, Y. Zhang, H. Ma, and J. Zhang, “Collaborative outsourced data integrity checking in multi-cloud environment,” in Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications (WASA '16), pp. 511–523, 2016.
  12. F. Sebe, A. Martinez-Balleste, Y. Deswarte, J. Domingo-Ferrer, and J. Quisquater, “Time-bounded remote file integrity checking,” Tech. Rep., July 2004, 04429, LAAS. View at Google Scholar
  13. F. Sebé, J. Domingo-Ferrer, A. Martínez-Ballesté, Y. Deswarte, and J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1034–1038, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Ateniese, R. Burns, R. Curtmola et al., “Remote data checking using provable data possession,” ACM Transactions on Information and System Security, vol. 14, no. 1, article 12, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Shoup, “On the security of a practical identification scheme,” Journal of Cryptology, vol. 12, no. 4, pp. 247–260, 1999. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Juels and B. S. Kaliski Jr., “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 584–597, ACM, Alexandria, VA, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of Cryptology. The Journal of the International Association for Cryptologic Research, vol. 26, no. 3, pp. 442–483, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability: theory and implementation,” in Proceedings of the ACM Workshop on Cloud Computing Security (CCSW '09), pp. 43–53, ACM, Chicago, IL, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. K. D. Bowers, A. Juels, and A. Oprea, “HAIL: a high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and Communications Security, pp. 187–198, ACM, Chicago, IL, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Naor and G. N. Rothblum, “The complexity of online memory checking,” in Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pp. 573–582, Pittsburgh, PA, USA, October 2005. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Xu and E.-C. Chang, “Towards efficient proofs of retrievability,” in Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, pp. 79-80, Seoul, Republic of Korea, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. M. A. Shah, R. Swaminathan, and M. Baker, “Privacy-preserving audit and extraction of digital contents,” IACR Cryptology EPrint Archive, vol. 2008, pp. 186–206, 2008. View at Google Scholar
  23. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proceedings of the 29th Annual IEEE International Conference on Computer Communications (INFOCOM 2010), pp. 1–9, Toronto, Canada, March 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm '08), pp. 1–10, ACM, Istanbul, Turkey, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring data storage security in cloud computing,” in Proceedings of the 17th International Workshop on Quality of Service (IWQoS '09), pp. 1–9, IEEE, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  26. C. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” ACM Transactions on Information and System Security (TISSEC), vol. 17, no. 4, article 15, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. D. Clarke, S. Devadas, M. Van Dijk, B. Gassend, and G. E. Suh, “Incremental multiset hash functions and their application to memory integrity checking,” in Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, pp. 188–207, Springer, 2003.
  28. M. T. Goodrich, R. Tamassia, and A. Schwerin, “Implementation of an authenticated dictionary with skip lists and commutative hashing,” in Proceedings of the DARPA Information Survivability Conference and Exposition II, DISCEX 2001, pp. 68–82, USA, June 2001. View at Publisher · View at Google Scholar · View at Scopus
  29. D. Boneh, B. Lynn, and H. Shacham, “Short signatures from the weil pairing,” in Proceedings of the ASIACRYPT 2001, pp. 514–532, Springer, Berlin, 2001.
  30. R. C. Merkle, “Protocols for public key cryptosystems,” in Proceedings of the 1980 IEEE Symposium on Security and Privacy, SP 1980, pp. 122–134, Oakland, Calif, USA, April 1980. View at Publisher · View at Google Scholar · View at Scopus
  31. J. Yuan and S. Yu, “Public integrity auditing for dynamic data sharing with multiuser modification,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1717–1726, 2015. View at Publisher · View at Google Scholar · View at Scopus
  32. Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 9, pp. 1432–1437, 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. Y. Yu, M. H. Au, Y. Mu et al., “Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage,” International Journal of Information Security, vol. 14, no. 4, pp. 307–318, 2015. View at Publisher · View at Google Scholar · View at Scopus
  34. X. Fan, G. Yang, Y. Mu, and Y. Yu, “On indistinguishability in remote data integrity checking,” The Computer Journal, vol. 58, no. 4, pp. 823–830, 2013. View at Publisher · View at Google Scholar · View at Scopus
  35. H. Wang and Y. Zhang, “On the knowledge soundness of a cooperative provable data possession scheme in multicloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 264–267, 2014. View at Publisher · View at Google Scholar · View at Scopus
  36. H. Wang, “Identity-based distributed provable data possession in multi-cloud storage,” IEEE Transactions on Services Computing, 2014. View at Publisher · View at Google Scholar
  37. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proceedings of the 2009 European Conference on Research in Computer Security, pp. 355–370, Springer, Saint-Malo, France, 2009.