Title :
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
Author :
Jin Li ; Xiao Tan ; Xiaofeng Chen ; Wong, Duncan S. ; Xhafa, Fatos
Author_Institution :
Sch. of Comput. Sci., Guangzhou Univ., Guangzhou, China
fDate :
April-June 1 2015
Abstract :
Cloud computing moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. In this work, we study the problem of ensuring the integrity of data storage in cloud computing. To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. However, the challenge is that the computational burden is too huge for the users with resource-constrained devices to compute the public authentication tags of file blocks. To tackle the challenge, we propose OPoR, a new cloud storage scheme involving a cloud storage server and a cloud audit server, where the latter is assumed to be semi-honest. In particular, we consider the task of allowing the cloud audit server, on behalf of the cloud users, to pre-process the data before uploading to the cloud storage server and later verifying the data integrity. OPoR outsources and offloads the heavy computation of the tag generation to the cloud audit server and eliminates the involvement of user in the auditing and in the pre-processing phases. Furthermore, we strengthen the proof of retrievability (PoR) model to support dynamic data operations, as well as ensure security against reset attacks launched by the cloud storage server in the upload phase.
Keywords :
cloud computing; computer centres; data integrity; security of data; storage management; OPoR; application software; centralized large data centers; cloud audit server; cloud computing; cloud storage scheme; cloud storage server; computational burden; data storage integrity; databases; dynamic data operations; file blocks; integrity verification; preprocessing phases; proof of retrievability model; public authentication tags; public verifiability; reset attacks; resource-constrained devices; retrievability proof; tag generation; upload phase; Authentication; Cloud computing; Computational modeling; Memory; Protocols; Servers; Cloud storage; auditing; integrity; proof of retrievability;
Journal_Title :
Cloud Computing, IEEE Transactions on
DOI :
10.1109/TCC.2014.2366148