Efficient data possession–checking protocol with deduplication in cloud
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2017-08-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147717727461 |
id |
doaj-db9b8ce70a2f4393a5981e546faf9f36 |
---|---|
record_format |
Article |
spelling |
doaj-db9b8ce70a2f4393a5981e546faf9f362020-11-25T02:55:15ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772017-08-011310.1177/1550147717727461Efficient data possession–checking protocol with deduplication in cloudJinxia Wei0Xinxin Niu1Ru Zhang2Jianyi Liu3Yuangang Yao4National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, ChinaChina Information Technology Security Evaluation Center, Beijing, ChinaDeduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. The signatures of all data blocks are generated and sent to the cloud server. Once receiving the data blocks and signatures, the cloud server compares the received signatures with the stored signatures. If there is a signature that has the same value as some stored signature, the received signature and data block will not be stored by the cloud server. Otherwise, the cloud server stores all received signatures and data blocks. In fact, these operations bring a lot of computational costs. To solve this problem, we propose a data integrity verification scheme with deduplication. In this scheme, the deduplication is performed by the cloud users, which can avoid additional communicational and computational costs. The experiment evaluation indicates that our scheme is practical for real application scenario. We demonstrate that the proposed scheme satisfies signature unforgeability, and the malicious users cannot obtain any legitimate file from the cloud server in the form of deception.https://doi.org/10.1177/1550147717727461 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jinxia Wei Xinxin Niu Ru Zhang Jianyi Liu Yuangang Yao |
spellingShingle |
Jinxia Wei Xinxin Niu Ru Zhang Jianyi Liu Yuangang Yao Efficient data possession–checking protocol with deduplication in cloud International Journal of Distributed Sensor Networks |
author_facet |
Jinxia Wei Xinxin Niu Ru Zhang Jianyi Liu Yuangang Yao |
author_sort |
Jinxia Wei |
title |
Efficient data possession–checking protocol with deduplication in cloud |
title_short |
Efficient data possession–checking protocol with deduplication in cloud |
title_full |
Efficient data possession–checking protocol with deduplication in cloud |
title_fullStr |
Efficient data possession–checking protocol with deduplication in cloud |
title_full_unstemmed |
Efficient data possession–checking protocol with deduplication in cloud |
title_sort |
efficient data possession–checking protocol with deduplication in cloud |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2017-08-01 |
description |
Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. The signatures of all data blocks are generated and sent to the cloud server. Once receiving the data blocks and signatures, the cloud server compares the received signatures with the stored signatures. If there is a signature that has the same value as some stored signature, the received signature and data block will not be stored by the cloud server. Otherwise, the cloud server stores all received signatures and data blocks. In fact, these operations bring a lot of computational costs. To solve this problem, we propose a data integrity verification scheme with deduplication. In this scheme, the deduplication is performed by the cloud users, which can avoid additional communicational and computational costs. The experiment evaluation indicates that our scheme is practical for real application scenario. We demonstrate that the proposed scheme satisfies signature unforgeability, and the malicious users cannot obtain any legitimate file from the cloud server in the form of deception. |
url |
https://doi.org/10.1177/1550147717727461 |
work_keys_str_mv |
AT jinxiawei efficientdatapossessioncheckingprotocolwithdeduplicationincloud AT xinxinniu efficientdatapossessioncheckingprotocolwithdeduplicationincloud AT ruzhang efficientdatapossessioncheckingprotocolwithdeduplicationincloud AT jianyiliu efficientdatapossessioncheckingprotocolwithdeduplicationincloud AT yuangangyao efficientdatapossessioncheckingprotocolwithdeduplicationincloud |
_version_ |
1724717235324321792 |