期刊文献+

An Efficient Method for Checking the Integrity of Data in the Cloud 被引量:2

An Efficient Method for Checking the Integrity of Data in the Cloud
下载PDF
导出
摘要 Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure. Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance. However, this poses new challenges related to creating secure and reliable data storage over unreliable service providers. In this study, we address the problem of ensuring the integrity of data storage in cloud computing. In particular, we consider methods for reducing the burden of generating a constant amount of metadata at the client side. By exploiting some good attributes of the bilinear group, we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage, which can be important for achieving widespread deployment of cloud computing. Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side, the objective of this study is to resolve this issue. Moreover, our scheme also supports data dynamics and public verifiability. Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure.
出处 《China Communications》 SCIE CSCD 2014年第9期68-81,共14页 中国通信(英文版)
基金 the National Natural Science Foundation of China,the National Basic Research Program of China ("973" Program) the National High Technology Research and Development Program of China ("863" Program)
关键词 cloud computing storage security public auditability provable data integrity 整性 检查 存储服务 数据存储 公开验证 数据中心 服务提供者 可证明安全
  • 相关文献

参考文献1

二级参考文献43

  • 1Amazon simple storage service (Amazon $3), http://aws.amazon.com/s3/, 2013. 被引量:1
  • 2Worl' data more than doubling every two years Driving big data opportunity, new IT roles, http://www.emc.com/about/news/pres s/2011/20110628 -01. htm, 2013. 被引量:1
  • 3IDC says world's storage is breaking Moore's law, more than doubling every two years, http://enterprise.media.seagate.com/2011/06/inside- it-storage/idc-says-worlds-storage-is-breaking-moores- law-more-than-doubling-every-two-years/, 2012. 被引量:1
  • 4D. Beaver, S. Kumar, H. C. Li, J. Sobel, and E Vajgel, Finding a needle in Haystack: Facebook's photo storage, in Proc. 9th USENIX Conference on Operating Systems Design and Implementation (OSD1), 2010. 被引量:1
  • 5M. Sathiamoorthy, M. Asteris, D. Papailiopoulos, A. G. Dimakis, R. Vadali, S. Chen, and D. Borthakur, XORing elephants: Novel erasure codes for big data, Proc. VLDB Endowment, to appear. 被引量:1
  • 6A. W. Kosner, Amazon cloud goes down Friday night, taking Netflix, Instagram And Pinterest with it, http://www.forbes.com/sites/anthonykosner/2012/06/30/ amazon-cloud-goes-down-friday-night-taking-netflix- instagram-and-pinterest-with-it/, Forbes, 2012, June 30. 被引量:1
  • 7Wuala, http://www.wuala.com/en/learn/technology, 2012. 被引量:1
  • 8M. A1-Fares, A. Loukissas, and A. Vahdat, A scalable, commodity data center network architecture, in Proc. ACM S1GCOMM Conference on Data Communication (SIGCOMM), 2008. 被引量:1
  • 9A. G. Dimakis, R B. Godfrey, M. J. W. Y. Wu, and K. Ramchandran, Network coding for distributed storage system, IEEE Trans. Inform. Theory, vol. 56, no. 9, pp. 4539-4551, 2010. 被引量:1
  • 10I. Reed and G. Solomon, Polynomial codes over certain finite fields, Journal of the Society for Industrial and Applied Mathematics, vol. 8, no. 2, pp. 300-304, 1960. 被引量:1

共引文献12

同被引文献25

  • 1Pang B, Lee L. Opinion mining and sentiment analysis [J]. Foundations and trends in informa- tion retrieval, 2008, 2(1-2): 1-135. 被引量:1
  • 2Pang B, Lee L, Vaithyanathan S. Thumbs up?: sentiment classification using machine learn- ing techniques[C]//Proceedings of the ACL- 02 conference on Empirical methods in natural language processing-Volume 10. Association for Computational Linguistics, 2002: 79-86. 被引量:1
  • 3Turney P D. Thumbs up or mumps uuwH:. - mantle orientation applied to unsupervised classification of reviews[C]//Proceedings of the 40th annual meeting on association for com- putational linguistics. Association for Computa- tional Linguistics, 2002: 417-424. 被引量:1
  • 4Wilson T, Wiebe J, Hoffmann R Recognizing contextual polarity in phrase-level sentiment analysis[C]//Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing. As- sociation for Computational Linguistics, 2005: 347-354. 被引量:1
  • 5Pang B, Lee L. Seeing stars: Exploiting class relationships for sentiment categorization with respect to rating scales[C]//Proceedings of the 43rd Annual Meeting on Association for Com- putational Linguistics. Association for Compu- tational Linguistics, 2005:115-124. 被引量:1
  • 6Hu M, Liu B. Mining opinion features in cus- tomer reviews[C]//AAAI. 2004, 4: 755-760. 被引量:1
  • 7Liu B, Hu M, Cheng J. Uplnlon ooserver: aHa- lyzing and comparing opinions on the web[C]// Proceedings of the 14th international confer- ence on World Wide Web. ACM, 2005: 342-351. 被引量:1
  • 8Pak A, Paroubek R Twitter as a Corpus for Sen- timent Analysis and Opinion Mining[C]//LREC. 2010. 被引量:1
  • 9Go A, Huang L, Bhayani R. Twitter sentiment analysis[J]. Entropy, 2009, 17. 被引量:1
  • 10Agarwal A, Xie B, Vovsha I, et al. Sentiment analysis of twitter data[C]//Proceedings of the Workshop on Languages in Social Media. Asso- ciation for Computational Linguistics, 2011: 30- 38. 被引量:1

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部