New Data Storage Auditing Protocols
- DOI
- 10.2991/ictcs-14.2014.10How to use a DOI?
- Keywords
- data storage auditing; cloud computing; blind technique, hash function
- Abstract
Cloud storage is a kind of cloud computing services that allows users to store their data in a remote cloud. Because of the loss of data control, data owners will concern that their data will be misused or unauthorized access by other users, in addition, they also worry their data may be lost in the clouds. Therefore, verify the authenticity of the data has become a key issue of data stored on the untrusted server. Shacham and Waters [17] give two Data storage audit protocols with full security proofs against arbitrary adversaries in the strongest secure model, but the server needs to give back a linear combination of the blocks that will leak audit data to the auditor. In order to improve the agreement of Shaham and waters, we use a hash function and blind technique to construct a public's privacy audit protocol.
- Copyright
- © 2014, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xinpeng Zhang AU - Chunxiang Xu AU - Wei Sai AU - Ying Li AU - Tao Zhou PY - 2014/05 DA - 2014/05 TI - New Data Storage Auditing Protocols BT - Proceedings of the 2nd International Conference on Teaching and Computational Science PB - Atlantis Press SP - 40 EP - 43 SN - 1951-6851 UR - https://doi.org/10.2991/ictcs-14.2014.10 DO - 10.2991/ictcs-14.2014.10 ID - Zhang2014/05 ER -