Data tag replacement algorithm for data integrity verification in cloud storage

Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity verification algorithms generate data tags for outsourced data blocks before verification, and then use these data tags to verify the data integr...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 103; p. 102205
Main Authors Xu, Guangwei, Han, Songhua, Bai, Yanke, Feng, Xiangyang, Gan, Yanglan
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier Ltd 01.04.2021
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0167-4048
1872-6208
DOI10.1016/j.cose.2021.102205

Cover

Abstract Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity verification algorithms generate data tags for outsourced data blocks before verification, and then use these data tags to verify the data integrity proofs provided by the data storage provider and determine whether the corresponding data blocks are intact. Unfortunately, most of these algorithms do not check the reliability of data tags. Once the data tags are compromised due to the exposure of the private key of data owner, the corrupted data can easily bypass subsequent verification, thereby invalidating the verification. To solve this issue, we propose a secure and reliable data tag replacement algorithm DTRA. The proposed algorithm uses proactive and reactive replacement to update the data owner’s private key. In addition, the algorithm applies homomorphic encryption to implement data tag replacement directly in the remote storage environment, avoids data owner downloading outsourced data from remote storage space, and reduces the data transmission overhead caused by data tag replacement. Theoretical analysis and experimental results indicate that the algorithm can achieve data tag replacement safely and reliably at a low cost.
AbstractList Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity verification algorithms generate data tags for outsourced data blocks before verification, and then use these data tags to verify the data integrity proofs provided by the data storage provider and determine whether the corresponding data blocks are intact. Unfortunately, most of these algorithms do not check the reliability of data tags. Once the data tags are compromised due to the exposure of the private key of data owner, the corrupted data can easily bypass subsequent verification, thereby invalidating the verification. To solve this issue, we propose a secure and reliable data tag replacement algorithm DTRA. The proposed algorithm uses proactive and reactive replacement to update the data owner's private key. In addition, the algorithm applies homomorphic encryption to implement data tag replacement directly in the remote storage environment, avoids data owner downloading outsourced data from remote storage space, and reduces the data transmission overhead caused by data tag replacement. Theoretical analysis and experimental results indicate that the algorithm can achieve data tag replacement safely and reliably at a low cost.
ArticleNumber 102205
Author Gan, Yanglan
Bai, Yanke
Xu, Guangwei
Han, Songhua
Feng, Xiangyang
Author_xml – sequence: 1
  givenname: Guangwei
  surname: Xu
  fullname: Xu, Guangwei
  email: gwxu@dhu.edu.cn
– sequence: 2
  givenname: Songhua
  surname: Han
  fullname: Han, Songhua
– sequence: 3
  givenname: Yanke
  surname: Bai
  fullname: Bai, Yanke
– sequence: 4
  givenname: Xiangyang
  surname: Feng
  fullname: Feng, Xiangyang
  email: fengxy@dhu.edu.cn
– sequence: 5
  givenname: Yanglan
  surname: Gan
  fullname: Gan, Yanglan
  email: ylgan@dhu.edu.cn
BookMark eNp9kM1qwzAQhEVJoUnaF-jJ0LNTSbYsGXop6S8EcmnPQpbXroxjpZISyNtXrnvqIZddGObbZWaBZoMdAKFbglcEk-K-W2nrYUUxJVGgFLMLNCeC07SgWMzQPJp4muNcXKGF9x3GhBdCzNH2SQWVBNUmDva90rCDISSqb60z4WuXNNYl9WgxQ4A2aqfkCM40Rqtg7BDlRPf2UCc-WKdauEaXjeo93PztJfp8ef5Yv6Wb7ev7-nGTappnIc2aOmMU85wwUIUuBYujwaSsgeUiL3nTkCyrykpnlRAa5wAVzxkuGC-J4jpborvp7t7Z7wP4IDt7cEN8KSnDGeGUYBZddHJpZ7130Mi9MzvlTpJgORYnOzkWJ8fi5FRchMQ_SJvwmzY4Zfrz6MOEQox-NOCk1wYGDbVxoIOsrTmH_wDZLYqd
CitedBy_id crossref_primary_10_1016_j_cose_2022_103002
crossref_primary_10_1007_s12065_021_00621_x
crossref_primary_10_1080_09537287_2022_2157746
crossref_primary_10_1109_ACCESS_2022_3176754
crossref_primary_10_3390_electronics12030717
crossref_primary_10_1007_s13132_024_01994_x
crossref_primary_10_1109_ACCESS_2023_3240066
Cites_doi 10.1109/TIFS.2014.2384391
10.1016/j.jss.2015.11.044
10.1109/TPDS.2017.2784423
10.1109/TIFS.2017.2746000
10.1023/A:1008354106356
10.1109/ACCESS.2017.2776275
10.1016/j.ins.2015.09.004
10.1109/TKDE.2011.62
10.1109/TIFS.2018.2850312
10.1109/TIFS.2017.2695449
10.1109/TCC.2014.2299807
10.1109/TPDS.2010.183
10.1109/TDSC.2018.2829880
10.1109/TIFS.2016.2528500
ContentType Journal Article
Copyright 2021 Elsevier Ltd
Copyright Elsevier Sequoia S.A. Apr 2021
Copyright_xml – notice: 2021 Elsevier Ltd
– notice: Copyright Elsevier Sequoia S.A. Apr 2021
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/j.cose.2021.102205
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Criminal Justice (Alumni)

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
ExternalDocumentID 10_1016_j_cose_2021_102205
S0167404821000298
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
AFXIZ
AGCQF
AGRNS
BNPGV
JQ2
K7.
L7M
L~C
L~D
SSH
ID FETCH-LOGICAL-c243t-3fd35207415ea6c9856c9f019de548497ff133b9bc3b88c04eeb745065791a7c3
IEDL.DBID .~1
ISSN 0167-4048
IngestDate Fri Jul 25 02:30:41 EDT 2025
Thu Apr 24 22:51:42 EDT 2025
Thu Oct 02 04:27:33 EDT 2025
Fri Feb 23 02:48:19 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Private key replacement
99-00
00-01
Reactive replacement
Data tag replacement
Proactive replacement
Homomorphic encryption
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c243t-3fd35207415ea6c9856c9f019de548497ff133b9bc3b88c04eeb745065791a7c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2503172105
PQPubID 46289
ParticipantIDs proquest_journals_2503172105
crossref_primary_10_1016_j_cose_2021_102205
crossref_citationtrail_10_1016_j_cose_2021_102205
elsevier_sciencedirect_doi_10_1016_j_cose_2021_102205
PublicationCentury 2000
PublicationDate April 2021
2021-04-00
20210401
PublicationDateYYYYMMDD 2021-04-01
PublicationDate_xml – month: 04
  year: 2021
  text: April 2021
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 2021
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References Omote, Thao (bib0017) 2014
Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song (bib0002) 2007
Yu, Wang (bib0034) 2017; 12
Shen, Qin, Yu, Hao, Hu (bib0022) 2019; 14
Merkle (bib0016) 1987
Guan, Ren, Zhang (bib0008) 2015; 380
Sookhak, Gani, Khan (bib0024) 2014; 380
Wang, Wang, Ren, Lou (bib0029) 2010
Deswarte, Quisquater, Saidane (bib0005) 2003
Peng, Zhou, Qiang Wang, Xu (bib0018) 2017; 5
Yu, Ren, Wang (bib0033) 2017; 10
Erway, Küpçü, Papamanthou, Tamassia (bib0006) 2009
Huang, Liu, Xian (bib0010) 2014
Ren, Yang, Wang, Fang (bib0020) 2014
Wang, Wang, Ren, Lou, Li (bib0030) 2011; 22
Shacham, Waters (bib0021) 2008
Sookhak, Yu, Zomaya (bib0025) 2018; 29
Wang, Li, Li (bib0027) 2014; 2
Fu, Yu, Zhang, Wang, Huang (bib0007) 2017
Ren, Shen, Wang, Fang (bib0019) 2015
Thao, Kho, Lim (bib0026) 2014
Yu, Wen (bib0035) 2014
Yu, Ren, Wang (bib0032) 2016; 11
Juels, Kaliski (bib0011) 2007
Wang, Wang, Ren (bib0028) 2009
Yang, Yu, Shen (bib0031) 2016; 113
Abo-alian, Badr, Tolba (bib0001) 2017
Lin, Chung, Han (bib0014) 2014
Shuang, Li, Zhikun, Yan (bib0023) 2015; 52
Ateniese, Pietro, Mancini, Tsudik (bib0003) 2008
Hao, Zhong, Yu (bib0009) 2011; 23
Limin Li, Wu (bib0013) 2017
Liu, Zic (bib0015) 2015; 1
Zuo, Shao, Liu, Wei, Ling (bib0037) 2018; 13
Koblitz, Menezes, Vanstone (bib0012) 2000; 19
Zhang, Yu, Hao, Wang, Ren (bib0036) 2018
Barsoum, Hasan (bib0004) 2017; 10
Sookhak (10.1016/j.cose.2021.102205_bib0025) 2018; 29
Yu (10.1016/j.cose.2021.102205_bib0033) 2017; 10
Abo-alian (10.1016/j.cose.2021.102205_bib0001) 2017
Koblitz (10.1016/j.cose.2021.102205_bib0012) 2000; 19
Lin (10.1016/j.cose.2021.102205_bib0014) 2014
Yang (10.1016/j.cose.2021.102205_bib0031) 2016; 113
Ren (10.1016/j.cose.2021.102205_bib0019) 2015
Shuang (10.1016/j.cose.2021.102205_bib0023) 2015; 52
Deswarte (10.1016/j.cose.2021.102205_bib0005) 2003
Ren (10.1016/j.cose.2021.102205_bib0020) 2014
Yu (10.1016/j.cose.2021.102205_bib0032) 2016; 11
Huang (10.1016/j.cose.2021.102205_bib0010) 2014
Shen (10.1016/j.cose.2021.102205_bib0022) 2019; 14
Zuo (10.1016/j.cose.2021.102205_bib0037) 2018; 13
Sookhak (10.1016/j.cose.2021.102205_bib0024) 2014; 380
Ateniese (10.1016/j.cose.2021.102205_bib0003) 2008
Yu (10.1016/j.cose.2021.102205_bib0035) 2014
Hao (10.1016/j.cose.2021.102205_bib0009) 2011; 23
Shacham (10.1016/j.cose.2021.102205_bib0021) 2008
Barsoum (10.1016/j.cose.2021.102205_bib0004) 2017; 10
Limin Li (10.1016/j.cose.2021.102205_bib0013) 2017
Liu (10.1016/j.cose.2021.102205_bib0015) 2015; 1
Juels (10.1016/j.cose.2021.102205_bib0011) 2007
Guan (10.1016/j.cose.2021.102205_bib0008) 2015; 380
Thao (10.1016/j.cose.2021.102205_bib0026) 2014
Yu (10.1016/j.cose.2021.102205_bib0034) 2017; 12
Zhang (10.1016/j.cose.2021.102205_sbref0036) 2018
Peng (10.1016/j.cose.2021.102205_bib0018) 2017; 5
Wang (10.1016/j.cose.2021.102205_bib0029) 2010
Ateniese (10.1016/j.cose.2021.102205_bib0002) 2007
Fu (10.1016/j.cose.2021.102205_sbref0007) 2017
Merkle (10.1016/j.cose.2021.102205_bib0016) 1987
Omote (10.1016/j.cose.2021.102205_bib0017) 2014
Erway (10.1016/j.cose.2021.102205_bib0006) 2009
Wang (10.1016/j.cose.2021.102205_bib0027) 2014; 2
Wang (10.1016/j.cose.2021.102205_bib0030) 2011; 22
Wang (10.1016/j.cose.2021.102205_bib0028) 2009
References_xml – volume: 113
  start-page: 130
  year: 2016
  end-page: 139
  ident: bib0031
  article-title: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
  publication-title: J. Syst. Softw.
– volume: 12
  start-page: 1931
  year: 2017
  end-page: 1940
  ident: bib0034
  article-title: Strong key-exposure resilient auditing for secure cloud storage
  publication-title: IEEE Trans. Inf. ForensicsSecur.
– volume: 23
  start-page: 1432
  year: 2011
  end-page: 1437
  ident: bib0009
  article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
  publication-title: IEEE Trans. Knowl. Data Eng.
– volume: 22
  start-page: 847
  year: 2011
  end-page: 859
  ident: bib0030
  article-title: Enabling public auditability and data dynamics for storage security in cloud computing
  publication-title: IEEE Trans. Parallel Distrib.Syst.
– year: 2017
  ident: bib0007
  article-title: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users
  publication-title: IEEE Transactions on Big Data
– start-page: 710
  year: 2014
  end-page: 713
  ident: bib0020
  article-title: Attributed based provable data possession in public cloud storage
  publication-title: Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)
– start-page: 213
  year: 2009
  end-page: 222
  ident: bib0006
  article-title: Dynamic provable data possession
  publication-title: Proceedings of the 16th ACM Conference on Computer and Communications Security
– start-page: 1115
  year: 2017
  end-page: 1121
  ident: bib0013
  article-title: FMR-PDP: flexible multiple-replica provable data possession in cloud storage
  publication-title: 2017 IEEE Symposium on Computers and Communications (ISCC)
– start-page: 464
  year: 2014
  end-page: 472
  ident: bib0026
  article-title: SW-POR: a novel POR scheme using Slepian-Wolf coding for cloud storage
  publication-title: Ubiquitous Intelligence and Computing 2014 IEEE 11th Intl Conf on and IEEE 11th Intl Conf on and Autonomic and Trusted Computing, and IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom)
– volume: 13
  start-page: 186
  year: 2018
  end-page: 196
  ident: bib0037
  article-title: Fine-grained two-factor protection mechanism for data sharing in cloud storage
  publication-title: IEEE Trans. Inf. ForensicsSecur.
– volume: 2
  start-page: 43
  year: 2014
  end-page: 56
  ident: bib0027
  article-title: Oruta: privacy-preserving public auditing for shared data in the cloud
  publication-title: IEEE Trans. Cloud Comput.
– start-page: 316
  year: 2014
  end-page: 325
  ident: bib0014
  article-title: Novel polynomial basis and its application to reed-solomon erasure codes
  publication-title: IEEE Symp. Found. Comput. Sci.
– volume: 380
  start-page: 101
  year: 2014
  end-page: 116
  ident: bib0024
  article-title: Dynamic remote data auditing for securing big data storage in cloud computing
  publication-title: Inf. Sci.
– start-page: 712
  year: 2014
  end-page: 717
  ident: bib0010
  article-title: Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage
  publication-title: 2014 IEEE International Conference on Communications Workshops (ICC)
– start-page: 1
  year: 2003
  end-page: 11
  ident: bib0005
  article-title: Remote integrity checking
  publication-title: Proceedings of IFIP Advances in Information and Communication Technology
– start-page: 1
  year: 2009
  end-page: 9
  ident: bib0028
  article-title: Ensuring data storage security in cloud computing
  publication-title: 17th International Workshop on Quality of Service (IWQoS)
– volume: 10
  start-page: 1167
  year: 2017
  end-page: 1179
  ident: bib0033
  article-title: Enabling cloud storage auditing with key-exposure resistance
  publication-title: IEEE Trans. Inf. ForensicsSecur.
– year: 2010
  ident: bib0029
  article-title: Privacy-preserving public auditing for data storage security in cloud computing
  publication-title: Proceedings of IEEE INFOCOM 2010
– start-page: 1
  year: 2008
  end-page: 10
  ident: bib0003
  article-title: Scalable and efficient provable data possession
  publication-title: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks
– volume: 5
  start-page: 26990
  year: 2017
  end-page: 27001
  ident: bib0018
  article-title: Identity-based public multi-replica provable data possession
  publication-title: IEEE Access
– year: 2018
  ident: bib0036
  article-title: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data
  publication-title: IEEE Transactions on Dependable and Secure Computing
– volume: 10
  start-page: 485
  year: 2017
  end-page: 497
  ident: bib0004
  article-title: Provable multicopy dynamic data possession in cloud computing systems
  publication-title: IEEE Trans. Inf. ForensicsSecur.
– volume: 14
  start-page: 331
  year: 2019
  end-page: 346
  ident: bib0022
  article-title: Enabling identity-based integrity auditing and data-sharing with sensitive information hiding for secure cloud storage
  publication-title: IEEE Trans. Inf. ForensicsSecur.
– volume: 1
  start-page: 897
  year: 2015
  end-page: 904
  ident: bib0015
  article-title: Proofs of encrypted data retrievability with probabilistic and homomorphic message authenticators
  publication-title: 2015 IEEE Trustcom/BigDataSE/ISPA
– start-page: 597
  year: 2014
  end-page: 603
  ident: bib0035
  article-title: MF-PDP: multi-function provable data possession scheme in cloud computing
  publication-title: IEEE International Conference on Cloud Computing and Intelligence Systems
– start-page: 98
  year: 2014
  end-page: 105
  ident: bib0017
  article-title: A new efficient and secure POR scheme based on network coding
  publication-title: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications
– volume: 11
  start-page: 1362
  year: 2016
  end-page: 1375
  ident: bib0032
  article-title: Enabling cloud storage auditing with verifiable outsourcing of key updates
  publication-title: IEEE Trans. Inf. ForensicsSecur.
– start-page: 90
  year: 2008
  end-page: 107
  ident: bib0021
  article-title: Compact proofs of retrievability
  publication-title: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security
– start-page: 369
  year: 1987
  end-page: 378
  ident: bib0016
  article-title: A digital signature based on a conventional encryption function
  publication-title: LNCS 293: Proc of Advances in Cryptology-CRYPTO’87
– volume: 29
  start-page: 999
  year: 2018
  end-page: 1012
  ident: bib0025
  article-title: Auditing big data storage in cloud computing using divide and conquer tables
  publication-title: IEEE Trans. Parallel Distrib.Syst.
– start-page: 131
  year: 2015
  end-page: 134
  ident: bib0019
  article-title: Outsourced data tagging via authority and delegable auditing for cloud storage
  publication-title: 2015 International Carnahan Conference on Security Technology (ICCST)
– volume: 19
  start-page: 173
  year: 2000
  end-page: 193
  ident: bib0012
  article-title: The state of elliptic curve cryptography
  publication-title: Des. Codes Cryptogr.
– start-page: 598
  year: 2007
  end-page: 609
  ident: bib0002
  article-title: Provable data possession at untrusted stores
  publication-title: Proceedings of the 14th ACM Conference on Computer and Communications Security
– volume: 52
  start-page: 1862
  year: 2015
  end-page: 1872
  ident: bib0023
  article-title: A grid-based data integrity verification method in cloud storage
  publication-title: Comput. Res. Dev.
– volume: 380
  start-page: 203
  year: 2015
  end-page: 223
  ident: bib0008
  article-title: Symmetric-key based proofs of retrievability supporting public verification
  publication-title: 20th European Symposium on Research in Computer Security (ESORICS 2015)
– start-page: 1
  year: 2017
  end-page: 21
  ident: bib0001
  article-title: Integrity as a service for replicated data on the cloud
  publication-title: Concurrency Comput.
– start-page: 584
  year: 2007
  end-page: 597
  ident: bib0011
  article-title: PORs: proof of retrievability for large files
  publication-title: Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07)
– start-page: 1
  year: 2003
  ident: 10.1016/j.cose.2021.102205_bib0005
  article-title: Remote integrity checking
– volume: 10
  start-page: 485
  issue: 3
  year: 2017
  ident: 10.1016/j.cose.2021.102205_bib0004
  article-title: Provable multicopy dynamic data possession in cloud computing systems
  publication-title: IEEE Trans. Inf. ForensicsSecur.
  doi: 10.1109/TIFS.2014.2384391
– volume: 10
  start-page: 1167
  issue: 6
  year: 2017
  ident: 10.1016/j.cose.2021.102205_bib0033
  article-title: Enabling cloud storage auditing with key-exposure resistance
  publication-title: IEEE Trans. Inf. ForensicsSecur.
– volume: 113
  start-page: 130
  issue: C
  year: 2016
  ident: 10.1016/j.cose.2021.102205_bib0031
  article-title: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2015.11.044
– start-page: 1115
  year: 2017
  ident: 10.1016/j.cose.2021.102205_bib0013
  article-title: FMR-PDP: flexible multiple-replica provable data possession in cloud storage
– year: 2010
  ident: 10.1016/j.cose.2021.102205_bib0029
  article-title: Privacy-preserving public auditing for data storage security in cloud computing
– start-page: 710
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0020
  article-title: Attributed based provable data possession in public cloud storage
– volume: 29
  start-page: 999
  issue: 5
  year: 2018
  ident: 10.1016/j.cose.2021.102205_bib0025
  article-title: Auditing big data storage in cloud computing using divide and conquer tables
  publication-title: IEEE Trans. Parallel Distrib.Syst.
  doi: 10.1109/TPDS.2017.2784423
– volume: 13
  start-page: 186
  issue: 1
  year: 2018
  ident: 10.1016/j.cose.2021.102205_bib0037
  article-title: Fine-grained two-factor protection mechanism for data sharing in cloud storage
  publication-title: IEEE Trans. Inf. ForensicsSecur.
  doi: 10.1109/TIFS.2017.2746000
– volume: 19
  start-page: 173
  issue: 2
  year: 2000
  ident: 10.1016/j.cose.2021.102205_bib0012
  article-title: The state of elliptic curve cryptography
  publication-title: Des. Codes Cryptogr.
  doi: 10.1023/A:1008354106356
– volume: 5
  start-page: 26990
  year: 2017
  ident: 10.1016/j.cose.2021.102205_bib0018
  article-title: Identity-based public multi-replica provable data possession
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2776275
– volume: 380
  start-page: 101
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0024
  article-title: Dynamic remote data auditing for securing big data storage in cloud computing
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2015.09.004
– start-page: 369
  year: 1987
  ident: 10.1016/j.cose.2021.102205_bib0016
  article-title: A digital signature based on a conventional encryption function
– start-page: 316
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0014
  article-title: Novel polynomial basis and its application to reed-solomon erasure codes
  publication-title: IEEE Symp. Found. Comput. Sci.
– volume: 23
  start-page: 1432
  issue: 9
  year: 2011
  ident: 10.1016/j.cose.2021.102205_bib0009
  article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2011.62
– volume: 380
  start-page: 203
  year: 2015
  ident: 10.1016/j.cose.2021.102205_bib0008
  article-title: Symmetric-key based proofs of retrievability supporting public verification
– year: 2017
  ident: 10.1016/j.cose.2021.102205_sbref0007
  article-title: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users
  publication-title: IEEE Transactions on Big Data
– volume: 14
  start-page: 331
  issue: 2
  year: 2019
  ident: 10.1016/j.cose.2021.102205_bib0022
  article-title: Enabling identity-based integrity auditing and data-sharing with sensitive information hiding for secure cloud storage
  publication-title: IEEE Trans. Inf. ForensicsSecur.
  doi: 10.1109/TIFS.2018.2850312
– start-page: 597
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0035
  article-title: MF-PDP: multi-function provable data possession scheme in cloud computing
– start-page: 1
  year: 2008
  ident: 10.1016/j.cose.2021.102205_bib0003
  article-title: Scalable and efficient provable data possession
– volume: 12
  start-page: 1931
  issue: 8
  year: 2017
  ident: 10.1016/j.cose.2021.102205_bib0034
  article-title: Strong key-exposure resilient auditing for secure cloud storage
  publication-title: IEEE Trans. Inf. ForensicsSecur.
  doi: 10.1109/TIFS.2017.2695449
– start-page: 1
  year: 2017
  ident: 10.1016/j.cose.2021.102205_bib0001
  article-title: Integrity as a service for replicated data on the cloud
  publication-title: Concurrency Comput.
– volume: 52
  start-page: 1862
  issue: 8
  year: 2015
  ident: 10.1016/j.cose.2021.102205_bib0023
  article-title: A grid-based data integrity verification method in cloud storage
  publication-title: Comput. Res. Dev.
– start-page: 598
  year: 2007
  ident: 10.1016/j.cose.2021.102205_bib0002
  article-title: Provable data possession at untrusted stores
– volume: 2
  start-page: 43
  issue: 1
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0027
  article-title: Oruta: privacy-preserving public auditing for shared data in the cloud
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2014.2299807
– volume: 22
  start-page: 847
  issue: 5
  year: 2011
  ident: 10.1016/j.cose.2021.102205_bib0030
  article-title: Enabling public auditability and data dynamics for storage security in cloud computing
  publication-title: IEEE Trans. Parallel Distrib.Syst.
  doi: 10.1109/TPDS.2010.183
– start-page: 213
  year: 2009
  ident: 10.1016/j.cose.2021.102205_bib0006
  article-title: Dynamic provable data possession
– start-page: 98
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0017
  article-title: A new efficient and secure POR scheme based on network coding
– start-page: 712
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0010
  article-title: Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage
– start-page: 464
  year: 2014
  ident: 10.1016/j.cose.2021.102205_bib0026
  article-title: SW-POR: a novel POR scheme using Slepian-Wolf coding for cloud storage
– start-page: 1
  year: 2009
  ident: 10.1016/j.cose.2021.102205_bib0028
  article-title: Ensuring data storage security in cloud computing
– year: 2018
  ident: 10.1016/j.cose.2021.102205_sbref0036
  article-title: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data
  publication-title: IEEE Transactions on Dependable and Secure Computing
  doi: 10.1109/TDSC.2018.2829880
– start-page: 131
  year: 2015
  ident: 10.1016/j.cose.2021.102205_bib0019
  article-title: Outsourced data tagging via authority and delegable auditing for cloud storage
– volume: 1
  start-page: 897
  year: 2015
  ident: 10.1016/j.cose.2021.102205_bib0015
  article-title: Proofs of encrypted data retrievability with probabilistic and homomorphic message authenticators
– start-page: 584
  year: 2007
  ident: 10.1016/j.cose.2021.102205_bib0011
  article-title: PORs: proof of retrievability for large files
– start-page: 90
  year: 2008
  ident: 10.1016/j.cose.2021.102205_bib0021
  article-title: Compact proofs of retrievability
– volume: 11
  start-page: 1362
  issue: 6
  year: 2016
  ident: 10.1016/j.cose.2021.102205_bib0032
  article-title: Enabling cloud storage auditing with verifiable outsourcing of key updates
  publication-title: IEEE Trans. Inf. ForensicsSecur.
  doi: 10.1109/TIFS.2016.2528500
SSID ssj0017688
Score 2.3562186
Snippet Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 102205
SubjectTerms Algorithms
Cloud computing
Cryptography
Data integrity
Data storage
Data tag replacement
Data transmission
Downloading
Encryption
Homomorphic encryption
Integrity
Outsourcing
Private key replacement
Proactive replacement
Reactive replacement
Tags
Verification
Title Data tag replacement algorithm for data integrity verification in cloud storage
URI https://dx.doi.org/10.1016/j.cose.2021.102205
https://www.proquest.com/docview/2503172105
Volume 103
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AIKHN
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: ACRLP
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  customDbUrl:
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AKRWK
  dateStart: 19820101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRhRK5YENhebhxPFYFaoCogxQqZtlu04pKm1V0pXfzl3iVAKhDiyRYtlRdD6fv7O_uyPkiluLKMT3VGrBQUnwklBw4enM8kz72liNwclPg6Q_ZA-jeFQj3SoWBmmVzvaXNr2w1q6l7aTZXk6n7ZeCQA8KGOIRdSgw4JcxjlUMbr42NI8A4HS6ye8NvV3gTMnxQk44-IhhgBkMQixh9_fm9MtMF3tP74DsOdBIO-V_HZKanR-R_aogA3Xr85g836pc0VxN6MoWZCs8-qNqNlmspvnbBwWASpESSsskEQDAKWgykoWK-YFmamaL9ZgiZRIMzQkZ9u5eu33PVUzwTMii3IuyMQCqAiVYlRiRxvDIAMWNLXgmTPAsA59UC20inabGZ9ZqzmKAIVwEipvolNTni7k9IzS2wihhAcBlEUtYom2gVWD8sTKCAQZrkKASlTQunThWtZjJijf2LlG8EsUrS_E2yPVmzLJMprG1d1zNgPyhEhKs_dZxzWq6pFuQnxKQXoTerh-f__OzF2QX30rWTpPU89XaXgIgyXWr0LgW2encP_YH32EH3rE
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTwIxEG4QD3rxbURRe_BmVvbRffRoUIIKeBASbk1buohBILhc_e3O7HZJNMaDlz10281mZjr9pv06Q8hVbAyiENeRiYEAJcJDQh5zR6UmTpWrtFF4Obnbi9oD9jgMhxXSLO_CIK3S-v7Cp-fe2rY0rDQbi8mk8ZIT6MEAfdyi9nmyQTZZ6McYgd18rnkeHuDpZJ3gG7rbmzMFyQtJ4RAk-h6mMPCxht3vq9MPP50vPq09smNRI70tfmyfVMzsgOyWFRmonaCH5PlOZpJmckyXJmdb4d4fldPxfDnJXt8pIFSKnFBaZIkABE7BlJEtlCsImqmezlcjipxJ8DRHZNC67zfbji2Z4GifBZkTpCNAVDlMMDLSPAnhkQKMGxkITRiP0xSCUsWVDlSSaJcZo2IWAg6JuSdjHRyT6mw-MyeEhoZryQ0guDRgEYuU8ZT0tDuSmjMAYTXilaIS2uYTx7IWU1ESx94EilegeEUh3hq5Xo9ZFNk0_uwdlhoQ32xCgLv_c1y9VJewM_JDANQLMNx1w9N_fvaSbLX73Y7oPPSezsg2vikoPHVSzZYrcw7oJFMXufV9AaWj4EY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data+tag+replacement+algorithm+for+data+integrity+verification+in+cloud+storage&rft.jtitle=Computers+%26+security&rft.au=Xu%2C+Guangwei&rft.au=Han%2C+Songhua&rft.au=Bai%2C+Yanke&rft.au=Feng%2C+Xiangyang&rft.date=2021-04-01&rft.issn=0167-4048&rft.volume=103&rft.spage=102205&rft_id=info:doi/10.1016%2Fj.cose.2021.102205&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cose_2021_102205
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon