Skip to main content

A New Data Integrity Verification Mechanism for SaaS

  • Conference paper
Web Information Systems and Mining (WISM 2010)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6318))

Included in the following conference series:

Abstract

Recently, the Software-as–a-Service (SaaS) model has been gaining more and more attention. In SaaS model, both applications and databases will be deployed in servers managed by untrustworthy service providers. Thus, the service providers might maliciously delete, modify or falsify tenants’ data due to some reasons, which brings great challenge to adoption of SaaS model. So this paper defines data integrity concept for SaaS data storage security, which could be measured in terms of durable integrity, correct integrity and provenance integrity. Basing on the meta-data driven data storage model and data chunking technology, SaaS data integrity issues will be mapped as a series of integrity issues of data chunks. Via cyclic group, data chunks traversal approach for verification is presented, and then SaaS data integrity verification can be realized based on the integrity verification of data chunks. Also, we demonstrate the correctness of the mechanism through analysis in this paper.

The research is supported by the National Natural Science Foundation of China under Grant No.60673130 and No.90818001, the Natural Science Foundation of Shandong Province of China under Grant No.Y2007G24 and No.Y2007G38.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: 17th IEEE International Workshop on Quality of Service (IWQoS 2009), pp. 1–9. IEEE Press, New York (2009)

    Google Scholar 

  2. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Bowers, K., Juels, A., Oprea, A.: HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security (CCS 2009), pp. 187–198. ACM, New York (2009)

    Google Scholar 

  4. Tian, X., Wang, X., Gao, M., Zhou, A.: Database as a Service – Security and Privacy Preserving. Journal of Software 21(5), 991–1006 (2010)

    Article  Google Scholar 

  5. Xie, M., Wang, H., Yin, J., Meng, X.: Integrity Auditing of Outsourced Data. In: Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB 2007), pp. 782–793. ACM, New York (2007)

    Google Scholar 

  6. Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM 2008), pp. 863–872. ACM, New York (2008)

    Google Scholar 

  7. Juels, A., Kaliski Jr., B.: PORs: proofs of retrievability for large files. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CCS 2007), pp. 584–597. ACM, New York (2007)

    Google Scholar 

  8. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security (CSS 2007), pp. 598–609. ACM, New York (2007)

    Google Scholar 

  9. Zhang, K., Shi, Y., Li, Q., Bian, J.: Data Privacy Preserving Mechanism based on Tenant Customization for SaaS. In: Proceedings of 2009 International Conference on Multimedia Information Networking and Security (MINES 2009), pp. 599–603. IEEE Computer Society, Los Alamitos (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, Y., Zhang, K., Li, Q. (2010). A New Data Integrity Verification Mechanism for SaaS. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds) Web Information Systems and Mining. WISM 2010. Lecture Notes in Computer Science, vol 6318. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16515-3_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16515-3_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16514-6

  • Online ISBN: 978-3-642-16515-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics