Abstract
In order to solve the integrity verification of outsourced file in cloud, we based on the concept of regenerating code (RC) to propose a new public auditing scheme with data recovery in this paper. With the advantage of RC, our scheme provides a (k, n) recovery functionality, i.e., only encoded data blocks from any k cloud servers, user can recover the original data files, where n denotes the total number of cloud servers and \(k\le n\).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 12 (2011)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)
Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539–4551 (2010)
Kim, D., Kwon, H., Hahn, C., Hur, J.: Privacy-preserving public auditing for educational multimedia data in cloud computing. Multimed. Tools Appl. 75(21), 13077–13091 (2016)
Mell, P., Grance, T., et al.: The NIST definition of cloud computing (2011)
Wan, C., Zhang, J., Pei, B., Chen, C.: Efficient privacy-preserving third-party auditing for ambient intelligence systems. J. Ambient Intell. Humaniz. Comput. 7(1), 21–27 (2016)
Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 2, 328–340 (2015)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114–121 (2014)
Wu, T.Y., Tseng, Y.M.: An ID-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)
Wu, T.Y., Tseng, Y.M.: A pairing-based publicly verifiable secret sharing scheme. J. Syst. Sci. Complex. 24(1), 186–194 (2011)
Wu, T.Y., Tseng, Y.M.: Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Inf. Secur. 7(3), 239–246 (2013)
Wu, T.Y., Tseng, Y.M., Tsai, T.T.: A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Netw. 56(12), 2994–3006 (2012)
Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable id-based encryption with a designated server. Ann. Telecommun.-Ann. Télécommun. 69(7–8), 391–402 (2014)
Wu, T.Y., Lin, Y., Wang, K.H., Chen, C.M., Pan, J.S., Wu, M.E.: Comments on a privacy preserving public auditing mechanism for shared cloud data. In: Proceedings of the 4th Multidisciplinary International Social Networks Conference, p. 48. ACM (2017)
Wu, T.Y., Lin, Y., Wang, K.H., Chen, C.M., Pan, J.S.: Comments on Yu et al’s shared data integrity verification protocol. In: The Euro-China Conference on Intelligent Data Analysis and Applications, pp. 73–78. Springer (2017)
Wu, L., Wang, J., Kumar, N., He, D.: Secure public data auditing scheme for cloud storage in smart city. Pers. Ubiquitous Comput. 21(5), 949–962 (2017)
Wu, T.Y., Chen, C.M., Wang, K.H., Pan, J.S., Zheng, W., Chu, S.C., Roddick, J.F.: Security analysis of rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)
Xu, Z., Wu, L., Khan, M.K., Choo, K.K.R., He, D.: A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J. Supercomput. 73(12), 5285–5309 (2017)
Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)
Zhang, J., Zhao, X.: Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. Clust. Comput. 19(1), 47–56 (2016)
Acknowledgements
The work of Tsu-Yang Wu was supported in part by the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025 and the Natural Science Foundation of Fujian Province under Grant no. 2018J01636. The work of Chien-Ming was supported in part by Shenzhen Technical Project (JCYJ20170307151750788) and in part by Shenzhen Technical Project (KQJSCX20170327161755).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, TY., Chen, CM., Wang, KH., Wu, J.MT., Pan, JS. (2019). A Public Auditing Scheme with Data Recovery. In: Pan, JS., Lin, JW., Sui, B., Tseng, SP. (eds) Genetic and Evolutionary Computing. ICGEC 2018. Advances in Intelligent Systems and Computing, vol 834. Springer, Singapore. https://doi.org/10.1007/978-981-13-5841-8_62
Download citation
DOI: https://doi.org/10.1007/978-981-13-5841-8_62
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5840-1
Online ISBN: 978-981-13-5841-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)