Provable Data Possession Supporting Secure Data Transfer for Cloud Storage

被引:15
|
作者
Yu, Yong [1 ,2 ]
Ni, Jianbing [1 ]
Yu, Yong [1 ,2 ]
Wu, Wei [2 ]
Wang, Yilei [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu, Peoples R China
来源
2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015) | 2015年
关键词
Cloud computing; Data integrity; Data Transfer;
D O I
10.1109/BWCCA.2015.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the appealing advantages of cloud storage, such as on-demand self-service and ubiquitous network access, an increasing number of users prefer to store their data on remote remote servers. However, outsourced data transfer becomes a critical requirement for users to shift their cloud storage providers because of the emergence of various cloud storage services with different qualities of services. Therefore, the users may not only be anxious about the state of their data on the cloud server, but also concern on whether the data are transferred entirely to the new cloud without corruption and whether the data on original cloud are discarded. To address these problems, we propose a provable data possession scheme for cloud storage services characterized by secure data transfer, provable data erasure, high error detection probability, confidential data storage. Our scheme can guarantee the remote data integrity when the data are maintaining on the cloud servers and are transferring between two clouds, and secure deletion of transferred data on the original cloud.
引用
收藏
页码:38 / 42
页数:5
相关论文
共 50 条
  • [41] IntegrityChain: Provable Data Possession for Decentralized Storage
    Li, Yannan
    Yu, Yong
    Chen, Ruonan
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1205 - 1217
  • [42] Provably Secure Identity Based Provable Data Possession
    Yu, Yong
    Zhang, Yafang
    Mu, Yi
    Susilo, Willy
    Liu, Hongyu
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 310 - 325
  • [43] Secure Multicloud Storage with Policy based access control and Cooperative Provable Data Possession
    Vishnupriya, S.
    Saranya, P.
    Rajasri, A.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [44] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    APPLIED MATHEMATICS AND COMPUTATION, 2020, 386
  • [45] Oriented Group Provable Data Possession in Public Cloud
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Fang, Liming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 775 - 778
  • [46] An efficient provable data possession scheme based on counting bloom filter for dynamic data in the cloud storage
    Jung E.
    Jeong J.
    2016, Science and Engineering Research Support Society (11): : 9 - 16
  • [47] A delayed-update Provable Data Possession in the Cloud
    Wang, Huifeng
    Li, Zhanhuai
    Zhang, Xiao
    Sun, Jian
    He, Qinlu
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND COMMUNICATIONS (SCAC), 2014, : 96 - 101
  • [48] Towards Comprehensive Provable Data Possession in Cloud Computing
    LI Chaoling
    CHEN Yue
    TAN Pengxu
    YANG Gang
    Wuhan University Journal of Natural Sciences, 2013, 18 (03) : 265 - 271
  • [49] PDPMT: Provable Data Possession for Multiple Cloud Tenants
    Huang, Daoli
    Wan, Changsheng
    2017 10TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI), 2017,
  • [50] Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage
    Yang, Hongbin
    Jiang, Shuxiong
    Shen, Wenfeng
    Lei, Zhou
    FUTURE INTERNET, 2018, 10 (06):