Proceedings of the 2nd International Conference on Teaching and Computational Science

New Data Storage Auditing Protocols

Authors
Xinpeng Zhang, Chunxiang Xu, Wei Sai, Ying Li, Tao Zhou
Corresponding Author
Xinpeng Zhang
Available Online May 2014.
DOI
10.2991/ictcs-14.2014.10How to use a DOI?
Keywords
data storage auditing; cloud computing; blind technique, hash function
Abstract

Cloud storage is a kind of cloud computing services that allows users to store their data in a remote cloud. Because of the loss of data control, data owners will concern that their data will be misused or unauthorized access by other users, in addition, they also worry their data may be lost in the clouds. Therefore, verify the authenticity of the data has become a key issue of data stored on the untrusted server. Shacham and Waters [17] give two Data storage audit protocols with full security proofs against arbitrary adversaries in the strongest secure model, but the server needs to give back a linear combination of the blocks that will leak audit data to the auditor. In order to improve the agreement of Shaham and waters, we use a hash function and blind technique to construct a public's privacy audit protocol.

Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Teaching and Computational Science
Series
Advances in Intelligent Systems Research
Publication Date
May 2014
ISBN
978-94-62520-21-9
ISSN
1951-6851
DOI
10.2991/ictcs-14.2014.10How to use a DOI?
Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xinpeng Zhang
AU  - Chunxiang Xu
AU  - Wei Sai
AU  - Ying Li
AU  - Tao Zhou
PY  - 2014/05
DA  - 2014/05
TI  - New Data Storage Auditing Protocols
BT  - Proceedings of the 2nd International Conference on Teaching and Computational Science
PB  - Atlantis Press
SP  - 40
EP  - 43
SN  - 1951-6851
UR  - https://doi.org/10.2991/ictcs-14.2014.10
DO  - 10.2991/ictcs-14.2014.10
ID  - Zhang2014/05
ER  -