Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Strong accountability for network storage
FAST '07 Proceedings of the 5th USENIX conference on File and Storage Technologies
Pors: proofs of retrievability for large files
Proceedings of the 14th ACM conference on Computer and communications security
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Compact Proofs of Retrievability
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Study of User-Friendly Hash Comparison Schemes
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Privacy-preserving public auditing for data storage security in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Efficient provable data possession for hybrid clouds
Proceedings of the 17th ACM conference on Computer and communications security
Knox: privacy-preserving auditing for shared data with large groups in the cloud
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
An integrity verification scheme for multiple replicas in clouds
WISM'12 Proceedings of the 2012 international conference on Web Information Systems and Mining
International Journal of Cloud Applications and Computing
On the security of auditing mechanisms for secure cloud storage
Future Generation Computer Systems
Hi-index | 0.00 |
In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling and index-hash table, supporting provable updates to outsourced data, and timely abnormal detection. In addition, we propose a probabilistic query and periodic verification for improving the performance of audit services. Our experimental results not only validate the effectiveness of our approaches, but also show our audit system verifies the integrity with lower computation overhead, requiring less extra storage for audit metadata.