Skip to main content

An Improved Data Integrity Verification Scheme for Cloud Storage

  • Conference paper
  • First Online:
Advances in Intelligent Networking and Collaborative Systems (INCoS 2023)

Abstract

In recent years, many cloud data security auditing protocols have been proposed to protect the integrity of cloud data. In 2017, Wang et al. proposed an FSBA scheme on batch auditing. We found that this integrity verification algorithm does not enable public verification. In this paper, we improved this scheme for supporting public verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ateniese, G., Burns, R., Curtmola, R.: Provable data possession at untrusted stores. In: Proceedings of the14thACM Conference on Computer and Communications Security (CCS2007), pp. 598–609. Alexandria, USA (2007)

    Google Scholar 

  2. Juels, A., Burton, S., Kaliski, J.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, New York pp. 584–597 (2007)

    Google Scholar 

  3. Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319–333. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_19

    Chapter  Google Scholar 

  4. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_22

    Chapter  Google Scholar 

  5. Wang, H.-F., Li, Z.-H., Zhang, X., Sun. J., Zhao, X.-N.: Batch auditing supporting fast searching invalid files in cloud storage. Ji Suan Ji Xue Bao/Chin. J. Comput. 40(10), 2338–2351 (2017). https://doi.org/10.11897/SP.J.1016.2017. 02338

  6. Li, T., Yang, A.J., Weng, J., Guo, Z.F.: Secure and efficient public auditing scheme for outsourced industrial internet data based on game contracts. Ruan Jian Xue Bao/J. Softw. (in Chinese). http://www.jos.org.cn/1000-9825/6716.htm

  7. Han, J., Li, Y.P., Yu, Y., Ding, Y.: Cloud auditing scheme with dynamic revocation of users and real-time updates of data. Ruan Jian Xue Bao/J. Softw. 31(2), 578−596 (2020). (in Chinese). http://www.jos.org.cn/1000-9825/5633.htm

  8. Shen, W.T., Yu, J., Yang, G.Y., Cheng, X.G., Hao, R.: Cloud storage integrity checking scheme with private key recovery capability. Ruan Jian Xue Bao/J. Softw. 27(6), 1451−1462 (2016). (in Chinese). http://www.jos.org.cn/1000-9825/4999

  9. Kun, Q., Huang, H.-F.: A new identity-based public auditing against malicious auditor in the cloud. Int. J. Embed. Syst. 11, 452–460 (2019)

    Google Scholar 

Download references

Acknowledgements

This work is supported by Natural Science Foundation of Shanxi Province (No. 2023-JC-YB-584), the Key Research and Development Program of Xianyang City (No. L2022ZDYFSF061), and Scientific Research Funding of Xianyang Vocational & Technical College on “Research on Key Technologies for Secure Outsourced Cloud Storage” (Grant No. 2021KJB03). This work is also supported by basic cutting-edge innovation projects of engineering university of PAP(WJY202313).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu An Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhou, M., Wang, X.A., Zhang, X., Xu, X., Zhang, J., Li, P. (2023). An Improved Data Integrity Verification Scheme for Cloud Storage. In: Barolli, L. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 182. Springer, Cham. https://doi.org/10.1007/978-3-031-40971-4_37

Download citation

Publish with us

Policies and ethics