DocumentCode
21980
Title
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
Author
Jin Li ; Xiao Tan ; Xiaofeng Chen ; Wong, Duncan S. ; Xhafa, Fatos
Author_Institution
Sch. of Comput. Sci., Guangzhou Univ., Guangzhou, China
Volume
3
Issue
2
fYear
2015
fDate
April-June 1 2015
Firstpage
195
Lastpage
205
Abstract
Cloud computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in cloud computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users with resource-constrained devices to compute the public authentication tags of file blocks. To tackle the challenge, we propose OPoR, a new cloud storage scheme involving a cloud storage server and a cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. OPoR outsources and offloads the heavy computation of the tag generation to the cloud audit server and eliminates the involvement of user in the auditing and in the pre-processing phases. Furthermore, we strengthen the proof of retrievability (PoR) model to support dynamic data operations, as well as ensure security against reset attacks launched by the cloud storage server in the upload phase.
Keywords
cloud computing; computer centres; data integrity; security of data; storage management; OPoR; application software; centralized large data centers; cloud audit server; cloud computing; cloud storage scheme; cloud storage server; computational burden; data storage integrity; databases; dynamic data operations; file blocks; integrity verification; preprocessing phases; proof of retrievability model; public authentication tags; public verifiability; reset attacks; resource-constrained devices; retrievability proof; tag generation; upload phase; Authentication; Cloud computing; Computational modeling; Memory; Protocols; Servers; Cloud storage; auditing; integrity; proof of retrievability;
fLanguage
English
Journal_Title
Cloud Computing, IEEE Transactions on
Publisher
ieee
ISSN
2168-7161
Type
jour
DOI
10.1109/TCC.2014.2366148
Filename
6942233
Link To Document