Skip to main content

A Big Picture of Integrity Verification of Big Data in Cloud Computing

  • Chapter
  • First Online:

Abstract

Big data is attracting more and more interests from numerous industries. Afewexamples are oil and gas mining, scientific research (biology, chemistry, physics), online social networks (Twitter, Facebook), multimedia data, and business transactions. With mountains of data collected from increasingly efficient data collecting devices as well as stored on fast-growing storage hardware, people are keen to find solutions to store and process the data more efficiently, and to discover more values from the mass at the same time. When referring to big data research problems, people often brings the 4 v’s—volume, velocity, variety, and value. These pose various brand-new challenges to computer scientists nowadays.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    For simplicity, we only discuss symmetric pairing here, although specific asymmetric parings could also be applied for better efficiency.

Reference

  1. Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica and Matei Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.

    Article  Google Scholar 

  2. Australian Government Department of Finance and Deregulation, “Big Data Strategy—Issues Paper,” 2013; http://agimo.gov.au/files/2013/03/Big-Data-Strategy-Issues-Paper1.pdf.

  3. Australian Government Department of Finance and Deregulation, “Cloud Computing Strategic Direction Paper: Opportunities and Applicability for Use by the Australian Government,” 2011; http://agimo.gov.au/files/2012/04/final_cloud_computing_strategy_version_1.pdf.

  4. Customer Presentations on Amazon Summit Australia, Sydney, 2012, available: http://aws.amazon.com/apac/awssummit-au/, accessed on: 25 March, 2013,

  5. Nick Heath, “Cern: Cloud Computing Joins Hunt for Origins of the Universe,” 2012, available: http://www.techrepublic.com/blog/european-technology/cern-cloud-computing-joins-hunt-for-origins-of-the-universe/262, accessed on: 25 March, 2013,

  6. Christian Vecchiola, Rodrigo N. Calheiros, Dileban Karunamoorthy and Rajkumar Buyya, “Deadline-driven Provisioning of Resources for Scientific Applications in Hybrid Clouds with Aneka,” Future Generation Computer Systems, vol. 28, no. 1, pp. 58–65, 2012.

    Google Scholar 

  7. Lizhe Wang, Marcel Kunze, Jie Tao and Gregor von Laszewski, “Towards Building A Cloud for Scientific Applications,” Advances in Engineering Software, vol. 42, no. 9, pp. 714–722, 2011.

    Article  Google Scholar 

  8. Lizhe Wang, Jie Tao, M. Kunze, A.C. Castellanos, D. Kramer and W. Karl, “Scientific Cloud Computing: Early Definition and Experience,” in Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC '08) pp. 825–830, 2008.

    Google Scholar 

  9. Stephen E. Schmidt, “Security and Privacy in the AWS Cloud,” Presentation on Amazon Summit Australia, 17 May 2012, Sydney, 2012, available: http://aws.amazon.com/apac/awssummit-au/, accessed on: 25 March, 2013,

  10. Jinhui Yao, Shiping Chen, Surya Nepal, David Levy and John Zic, “TrustStore: Making Amazon S3 Trustworthy with Services Composition,” in Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID ’10), pp. 600–605, 2010.

    Google Scholar 

  11. Dimitrios Zissis and Dimitrios Lekkas, “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592, 2011.

    Google Scholar 

  12. Surya Nepal, Shiping Chen, Jinhui Yao and Danan Thilakanathan, “DIaaS: Data Integrity as a Service in the Cloud,” in Proceedings of the 4th International Conference on Cloud Computing (IEEE CLOUD ’11), pp. 308–315, 2011.

    Google Scholar 

  13. Erica Naone, “What Twitter Learns from All Those Tweets,” Technology Review, 28 September, 2010, available: http://www.technologyreview.com/view/420968/what-twitter-learns-from-all-those-tweets/, accessed on: 25 March, 2013,

  14. Robert Johnson, David Molnar, Dawn Song and David Wagner, “Homomorphic Signature Schemes,” Topics in Cryptology—CT-RSA 2002, Lecture Notes in Computer Science, vol. 2271, pp. 244–262, 2002.

    Google Scholar 

  15. Dan Boneh, Hovav Shacham and Ben Lynn, “Short Signatures from the Weil Pairing,” Journal of Cryptology, vol. 17, no. 4, pp. 297–319, 2004.

    MATH  Google Scholar 

  16. Ralph C. Merkle, “A Digital Signature Based on a Conventional Encryption Function,” in Proceedings of A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology (CRYPTO '87), pp. 369-378, 1987.

    Google Scholar 

  17. Giuseppe Ateniese, Randal Burns Johns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson and Dawn Song, “Provable Data Possession at Untrusted Stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–609 2007.

    Google Scholar 

  18. Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson and Dawn Song, “Remote Data Checking Using Provable Data Possession,” ACM Transactions on Information and System Security, vol. 14, no. 1, pp. Article 12, 2011.

    Google Scholar 

  19. Hovav Shacham and Brent Waters, “Compact Proofs of Retrievability,” in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '08), pp. 90–107 2008.

    Google Scholar 

  20. Chris Erway, Alptekin Küpçü, Charalampos Papamanthou and Roberto Tamassia, “Dynamic Provable Data Possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), pp. 213–222, 2009.

    Google Scholar 

  21. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou and Jin Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011.

    Article  Google Scholar 

  22. Cong Wang, S.M. Chow, Qian, Kui Ren and Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Transactions on Computers, In Press, 2011.

    Google Scholar 

  23. Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang, Chi Yang, Rajiv Ranjan and Kotagiri Ramamohanarao, “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-grained Updates,” IEEE Transactions on Parallel and Distributed Systems, in press, 2013.

    Google Scholar 

  24. Cong Wang, S.M. Chow, Qian, Kui Ren and Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.

    Google Scholar 

  25. Ari Juels and Jr. B. S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 584–597, 2007.

    Google Scholar 

  26. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini and Gene Tsudik, “Scalable and Efficient Provable Data Possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks (SecureComm '08), pp. 1–10, 2008.

    Google Scholar 

  27. Reza Curtmola, Osama Khan, Randal C. Burns and Giuseppe Ateniese:, “MR-PDP: Multiple-Replica Provable Data Possession.,” in Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS '08), pp. 411–420, 2008.

    Google Scholar 

  28. Giuseppe Ateniese, Seny Kamara and Jonathan Katz, “Proofs of Storage from Homomorphic Identification Protocols,” in Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '09), pp. 319–333, 2009.

    Google Scholar 

  29. Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Mengyang Yu, “Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231–2244, 2012.

    Article  Google Scholar 

  30. Boyang Wang, Sherman S.M. Chow, Ming Li and Hui Li, “Storing Shared Data on the Cloud via Security-Mediator,” in 33rd IEEE International Conference on Distributed Computing Systems (ICDCS ’13), 2013.

    Google Scholar 

  31. Boyang Wang, Baochun Li and Hui Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” in Proceedings of the 32nd Annual IEEE International Conference on Computer Communications (INFOCOM’13), pp. 2904–2912, 2013.

    Google Scholar 

  32. Yihua Zhang and Marina Blanton, “Efficient Dynamic Provable Possession of Remote Data via Update Trees,” IACR Cryptology ePrint Archive, Report 2012/291, 2012.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this chapter

Cite this chapter

Liu, C., Ranjan, R., Zhang, X., Yang, C., Chen, J. (2015). A Big Picture of Integrity Verification of Big Data in Cloud Computing. In: Khan, S., Zomaya, A. (eds) Handbook on Data Centers. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-2092-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-2092-1_21

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-2091-4

  • Online ISBN: 978-1-4939-2092-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics