Skip to main content

Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

Abstract

With the rapid development of cloud computing, more and more users are willing to employ cloud storage. As a result, an increasing number of companies invest cloud storage thus provide users with data storage services, which equipped with distinct quality, e.g., storage capacity, access speed, security, prices and reliability. To enjoy more suitable data storage service, the user may change the cloud service providers. As a result, outourced data migration between two different cloud servers has become a fundamental requirement. Therefore, how to securely migrate outsourced data from one semi-trusted cloud to another becomes a primary concern of user. To solve this problem, we construct a blockchain-based publicly verifiable outsourced data migration scheme supporting integrity verification. In the proposed scheme, the user can migrate outsourced data blocks from the original cloud to the target cloud without retrieving them from the original cloud. Meanwhile, the target cloud can check the data integrity to guarantee that the data blocks are migrated integrally. Moreover, by making use of the decentration of blockcahin, the proposed scheme can achieve public verifiability without requiring any third party auditor. Finally, we provide the security analysis and efficiency evaluation, which can respectively demonstrate the security and practicality of the novel proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In a Merkle hash tree, the auxiliary authentication information is a data set which contains all of the sibling nodes on the path from the desired leaf node to the root node.

References

  1. Zhang, S., Sun, W., Liu, J., Kato, N.: Physical layer security in large-scale probabilistic caching: analysis and optimization. IEEE Commun. Lett. 23(9), 1484–1487 (2019)

    Article  Google Scholar 

  2. Cui, Y., Lai, Z., Wang, X., Dai, N., Miao, C.: QuickSync: improving synchronization efficiency for mobile cloud storage services. IEEE Trans. Mob. Comput. 16(12), 3513–3526 (2017)

    Article  Google Scholar 

  3. C. V. Networking, Cisco global cloud index: forecast and methodology, 2016–2021, White paper. Cisco Public, San Jose

    Google Scholar 

  4. Du, M., Wang, Q., He, M., Weng, J.: Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans. Inf. Forensics Secur. 13(9), 2320–2332 (2018)

    Article  Google Scholar 

  5. Garg, N., Bawa, S.: RITS-MHT: relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. J. Netw. Comput. Appl. 84, 1–13 (2017)

    Article  Google Scholar 

  6. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14992-4_13

    Chapter  Google Scholar 

  7. Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., Choo, K.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secur. Comput. 16(1), 72–83 (2019)

    Article  Google Scholar 

  8. Liu, Y., Xiao, S., Wang, H., Wang, X.: New provable data transfer from provable data possession and deletion for secure cloud storage. Int. J. Distrib. Sens. Netw. 15(4), 1–12 (2019)

    MathSciNet  Google Scholar 

  9. Liu, Y., Wang, X.A., Cao, Y., Tang, D., Yang, X.: Improved provable data transfer from provable data possession and deletion in cloud storage. In: Xhafa, F., Barolli, L., Greguš, M. (eds.) INCoS 2018. LNDECT, vol. 23, pp. 445–452. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-98557-2_40

    Chapter  Google Scholar 

  10. Mohtasebi, S., Dehghantanha, A., Choo, K.: Cloud storage forensics : analysis of data remnants on SpiderOak, JustCloud, and pCloud. arXiv: Cryptography and Security

    Google Scholar 

  11. Morales-Sandoval, M., Gonzalez-Compean, J.L., Diaz-Perez, A., Sosa-Sosa, V.J.: A pairing-based cryptographic approach for data security in the cloud. Int. J. Inf. Secur. 17(4), 441–461 (2017). https://doi.org/10.1007/s10207-017-0375-z

  12. Ni, J., Lin, X., Zhang, K., Yu, Y., Shen, X.: Secure outsourced data transfer with integrity verification in cloud storage. In: Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, ICCC 2016, pp. 1–6. IEEE Computer Society, Washington, DC (2016)

    Google Scholar 

  13. Nakamoto, S., et al.: Bitcoin: A Peer-to-Peer Electronic Cash System

    Google Scholar 

  14. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)

    Article  Google Scholar 

  15. Wang, Y., Tao, X., Ni, J., Yu, Y.: Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1), 106–121 (2018)

    Article  Google Scholar 

  16. Wang. H., He. D., Fu. A, Li. Q., Wang. Q: Provable data possession with outsourced data transfer. IEEE Trans. Serv. Comput. 1–12 (2019)

    Google Scholar 

  17. Xue, L., Ni, J., Li, Y., Shen, J.: Provable data transfer from provable data possession and deletion in cloud storage. Comput. Stand. Interfaces 54, 46–54 (2017)

    Article  Google Scholar 

  18. Yan, Y., Wu, L., Gao, G., Wang, H., Xu, W.: A dynamic integrity verification scheme of cloud storage data based on lattice and bloom filter. J. Inf. Secur. Appl. 39, 10–18 (2018)

    Google Scholar 

  19. Yu, L., Shen, H., Cai, Z., Liu, L., Calton, P.: Towards bandwidth guarantee for virtual clusters under demand uncertainty in multi-tenant clouds. IEEE Trans. Parallel Distrib. Syst. 29(2), 450–465 (2018)

    Article  Google Scholar 

  20. Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103, 185–193 (2018)

    Article  Google Scholar 

  21. Yu, L., Shen, H., Karan, S., Ye, L., Cai, Z.: CoRE: cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. IEEE Trans. Parallel Distrib. Syst. 28(2), 446–461 (2017)

    Google Scholar 

  22. Yang, C., Wang, J., Tao, X., Chen, X.: Publicly verifiable data transfer and deletion scheme for cloud storage. In: Naccache, D., Xu, S., Qing, S., Samarati, P., Blanc, G., Lu, R., Zhang, Z., Meddahi, A. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 445–458. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01950-1_26

    Chapter  Google Scholar 

  23. Yang, C., Tao, X., Zhao, F., Wang, Y.: Secure data transfer and deletion from counting Bloom filter in cloud computing. Chin. J. Electron. 29(2), 273–280 (2020)

    Article  Google Scholar 

  24. Yang, C., Tao, X., Zhao, F.: Publicly verifiable data transfer and deletion scheme for cloud storage. Int. J. Distrib. Sens. Netw. 15, 1–12 (2019)

    Google Scholar 

  25. Yu, Y., Ni, J., Wu, W., Wang, Y.: Provable data possession supporting secure data transfer for cloud storage. In: Proceedings of the 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, pp. 38–42. IEEE Computer Society, Washington (2015)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, the National Natural Science Foundation of China (No. 61962015), the Science and Technology Program of Guangxi (No. AB17195045) and the Natural Science Foundation of Guangxi (No. 2016GXNSFAA380098).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changsong Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, C., Tao, X., Wang, S., Zhao, F. (2020). Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics