Skip to main content
Log in

MHB*T based dynamic data integrity auditing in cloud storage

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Integrity audit technology is proposed to protect data in remote cloud servers from being tampered with. However, the challenge is that the computational complexity is too large for users with resource-constrained devices during integrity verification. Also, many prior works lack support for dynamic operations. In this paper, a trusted third party is employed to complete the public auditing to reduce the computational complexity of users. Meanwhile, a trusted proxy server is employed to compute the tags under the delegation of the data owner. To improve the efficiency of data retrieval and support dynamic operations, a new authentication structure is proposed by combining Merkle Hash Tree and B* tree. Based on the new authentication structure, we propose a public integrity auditing scheme, which is secure against forge attacks under the assumptions of the discrete logarithm problem and the computational Diffie-Hellman problem in bilinear groups in the random oracle model. Security analysis and experiment results show that our scheme is provably secure and has low communication complexity and computational complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)

  2. Juels, A., Kaliski, Jr B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007)

  3. Shacham, H., Waters, B.: Compact proofs of retrievability. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 90–107. Springer, Heidelberg (2008)

  4. Sun, Y., Liu, Q., Chen, X., Du, X.: An adaptive authenticated data structure with privacy-preserving for big data stream in cloud. IEEE Trans. Inf. Forensics Secur. 15, 3295–3310 (2020)

    Article  Google Scholar 

  5. Zhang, Y., Xu, C., Lin, X., Shen, X.S.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. (2019). https://doi.org/10.1109/TCC.2019.2908400

    Article  Google Scholar 

  6. Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors. IEEE Trans. Cloud Comput. (2019). https://doi.org/10.1109/TCC.2019.2927219

    Article  Google Scholar 

  7. Shen, W., Qin, J., Yu, J., Hao, R., Hu, J., Ma, J.: Data integrity auditing without private key storage for secure cloud storage. IEEE Trans. Cloud Comput. (2019). https://doi.org/10.1109/TCC.2019.2921553

    Article  Google Scholar 

  8. Balasubramanian, V., Mala, T.: Cloud data integrity checking using bilinear pairing and network coding. Clust. Comput. 22(3), 6927–6935 (2019)

    Article  Google Scholar 

  9. Fan, Y., Lin, X., Tan, G., et al.: One secure data integrity verification scheme for cloud storage. Future Gener. Comput. Syst. 96, 376–385 (2019)

    Article  Google Scholar 

  10. Li, F., Hadjieleftheriou, M., Kollios, G., et al.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 121–132. ACM (2006)

  11. Erway, C.C., \(K\ddot{u}pc\ddot{u}\) A., Papamanthou, C., et al.: Dynamic provable data possession. In Proceedings of the 14th International Conference on Computer Communication Security, pp. 213–222. ACM (2009)

  12. Wang, Q., Wang, C., Ren, K., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  13. Liu, C., Ranjan, R., Yang, C., et al.: Mur-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2015)

    Article  MathSciNet  Google Scholar 

  14. Zhu, Y., Ahn, G.J., Hu, H., et al.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)

    Article  Google Scholar 

  15. Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)

    Article  Google Scholar 

  16. Zhang, J., Meng, H., Yu, Y.: Achieving public verifiability and data dynamics for cloud data in the standard model. Clust. Comput. 20(3), 2641–2653 (2017)

    Article  Google Scholar 

  17. Li, J., Squicciarini, A.C., Lin, D., et al.: MMB \(^{cloud} \)-tree: authenticated index for verifiable cloud service selection. IEEE Trans. Depend. Secur. Comput. 14(2), 185–198 (2017)

    Article  Google Scholar 

  18. Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)

    Article  Google Scholar 

  19. Li, X., Liu, S., Lu, R.: Comments on a public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 15, 2881–2883 (2020)

    Article  Google Scholar 

  20. Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 6(3), 680–693 (2018)

    Article  Google Scholar 

  21. Shang, T., Zhang, F., Chen, X., Liu, J., Lu, X.: Identity-based dynamic data auditing for big data storage. IEEE Trans. Big Data (2019). https://doi.org/10.1109/TBDATA.2019.2941882

    Article  Google Scholar 

  22. Daniel, E., Vasanthi, N.A.: LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Clust. Comput. 22(1), 1247–1258 (2019)

    Article  Google Scholar 

  23. He, K., Chen, J., Yuan, Q., Ji, S., He, D., Du, R.: Dynamic group-oriented provable data possession in the cloud. IEEE Trans. Depend. Secur. Comput. (2019). https://doi.org/10.1109/TDSC.2019.2925800

    Article  Google Scholar 

  24. Sengupta, B., Ruj, S.: Efficient proofs of retrievability with public verifiability for dynamic cloud storage. IEEE Trans. Cloud Comput. 8(1), 138–151 (2020)

    Article  Google Scholar 

  25. Rao, L., Zhang, H., Tu, T.: Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated Merkle hash tree. IEEE Trans. Serv. Comput. 13(3), 451–463 (2020)

    Article  Google Scholar 

  26. Liang, W., Fan, Y., Li, K.C., et al.: Secure data storage and recovery in industrial blockchain network environments. IEEE Trans. Ind. Inform. 16(10), 6543–6552 (2020)

    Article  Google Scholar 

  27. Mishra, R., Ramesh, D., Edla, D.R.: Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment. Clust. Comput. (2020). https://doi.org/10.1007/s10586-020-03193-0

    Article  Google Scholar 

  28. Rabaninejad, R., Asaar, M.R., Attari, M.A., et al.: An identity-based online/offline secure cloud storage auditing scheme. Clust. Comput. 23, 1455–1468 (2020)

    Article  Google Scholar 

  29. Yu, Y., Au, M.H., Ateniese, G., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)

    Article  Google Scholar 

  30. Wang, Y., Wu, Q., Qin, B., et al.: Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans. Inf. Forensics Secur. 12(4), 940–952 (2017)

    Article  Google Scholar 

  31. Li, J., Tan, X., Chen, X., et al.: Opor: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3(2), 195–205 (2015)

    Article  Google Scholar 

  32. Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. (2020). https://doi.org/10.1109/JSYST.2020.2978146

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the editor and anonymous reviewers for their valuable advice that is very helpful for improving our paper. This work was supported by Scientific Research Program Funded by Shaanxi Provincial Education Department (Program No. 20JK0906), National Natural Science Foundation of China under grant (No. 61802302), National Key R&D Program of China (No. 2017YFB0802400), and the Research Foundation of Education Bureau of Hunan Province (No. 17C1538).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Luo.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, W., Ma, W. & Gao, J. MHB*T based dynamic data integrity auditing in cloud storage. Cluster Comput 24, 2115–2132 (2021). https://doi.org/10.1007/s10586-021-03248-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03248-w

Keywords

Navigation