Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.11.483

Outsourced Storage Auditing Scheme using Coefficient Matrix  

Eun, Hasoo (한양대학교 컴퓨터공학과)
Oh, Heekuck (한양대학교 컴퓨터공학과)
Kim, Sangjin (한국기술교육대학교 컴퓨터공학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.11, 2013 , pp. 483-488 More about this Journal
Abstract
Users can access their data anywhere, at any time by using outsourced storage. But they cannot know how service provider manage the data. Even user cannot know when data damaged. To solve these problems, the outsourced storage auditing schemes has been proposed. Most proposed schemes are based on Homomorphic Verifiable Tags. But it has computational efficiency limitation because data used to exponent. In this paper, we propose a novel approach to outsourced storage auditing scheme using coefficient matrix. In the proposed scheme, data used to auditing by coefficient matrix form. Auditing procedures are proceed as solving the linear simultaneous equation. The auditor can audit easily by solving the equation using solution vector. The auditor can audit the n size data using sqrt(n) size data through out proposed scheme.
Keywords
Outsourced; Storage Auditing; Homomorphic Verifiable Tags; Coefficient Matrix;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Yang and X Jia, "Data storage auditing service in cloud computing challenges, methods and opportunities," World Wide Web, Vol.15, pp.409-428, 2012.   DOI
2 B. Wang, B. Li, and H. Li, "Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud," Applied Cryptography and Network Security (ACNS), LNCS 7341, pp.507-525, 2012.
3 B. Wang, B. Li, and H. Li, "Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud," 2012 IEEE Fifth International Conference on Cloud Computing, pp.295-302, 2012.
4 K. Yang and X. Jia, "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing," IEEE Trans. on Parallel and Distributed Systems, Vol.24, No.9, pp.1717-1726, Sept., 2013.   DOI   ScienceOn
5 Y. Deswarte, J.-J. Quisquater, and A. Saidane, "Remote Integrity Checking," in Integrity and Internal Control in Information Systems VI. Vol.140, S. Jajodia and L. Strous, Eds., ed: Springer US, 2004, pp.1-11.
6 D. L. G. Filho and P. S. L. M. Barreto, "Demonstrating data possession and uncheatable data transfer," IACR Cryptology ePrint Archive, Vol.2006, pp.150, 2006.
7 G. Yamamoto, S. Oda, and K. Aoki, "Fast integrity for large data,"" in Workshop on Software Performance Enhancement for Encryption and Decryption (SPEED 2007), 2007, pp.21-32.
8 G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, et al., "Provable data possession at untrusted stores," presented at the Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2007.
9 H. Shacham and B. Waters, "Compact Proofs of Retrievability," presented at the Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Melbourne, Australia, 2008.
10 W. Cong, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Transactions on Computers, Vol.62, pp. 362-375, 02/01 2013.   DOI   ScienceOn
11 C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Probable Data Possession," Proceedings of the 16th ACM conference on Computer and Communications Security (CCS '09), pp.213-222, Nov., 2009.
12 Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proceedings of the 14th European conference on Research in computer security (ESORICS '09), pp.355-370, 2009.
13 C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proceedings of IEEE INFOCOM 2010, pp.1-9, 2010.
14 Q. Wang, C. Wang, K. Ren, and W. Lou, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transactions on Parallel and Distributed Systems, pp.847-859, Mar., 2011.