Data tag replacement algorithm for data integrity verification in cloud storage
Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity verification algorithms generate data tags for outsourced data blocks before verification, and then use these data tags to verify the data integr...
Saved in:
| Published in | Computers & security Vol. 103; p. 102205 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Amsterdam
Elsevier Ltd
01.04.2021
Elsevier Sequoia S.A |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0167-4048 1872-6208 |
| DOI | 10.1016/j.cose.2021.102205 |
Cover
| Abstract | Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity verification algorithms generate data tags for outsourced data blocks before verification, and then use these data tags to verify the data integrity proofs provided by the data storage provider and determine whether the corresponding data blocks are intact. Unfortunately, most of these algorithms do not check the reliability of data tags. Once the data tags are compromised due to the exposure of the private key of data owner, the corrupted data can easily bypass subsequent verification, thereby invalidating the verification. To solve this issue, we propose a secure and reliable data tag replacement algorithm DTRA. The proposed algorithm uses proactive and reactive replacement to update the data owner’s private key. In addition, the algorithm applies homomorphic encryption to implement data tag replacement directly in the remote storage environment, avoids data owner downloading outsourced data from remote storage space, and reduces the data transmission overhead caused by data tag replacement. Theoretical analysis and experimental results indicate that the algorithm can achieve data tag replacement safely and reliably at a low cost. |
|---|---|
| AbstractList | Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity verification algorithms generate data tags for outsourced data blocks before verification, and then use these data tags to verify the data integrity proofs provided by the data storage provider and determine whether the corresponding data blocks are intact. Unfortunately, most of these algorithms do not check the reliability of data tags. Once the data tags are compromised due to the exposure of the private key of data owner, the corrupted data can easily bypass subsequent verification, thereby invalidating the verification. To solve this issue, we propose a secure and reliable data tag replacement algorithm DTRA. The proposed algorithm uses proactive and reactive replacement to update the data owner's private key. In addition, the algorithm applies homomorphic encryption to implement data tag replacement directly in the remote storage environment, avoids data owner downloading outsourced data from remote storage space, and reduces the data transmission overhead caused by data tag replacement. Theoretical analysis and experimental results indicate that the algorithm can achieve data tag replacement safely and reliably at a low cost. |
| ArticleNumber | 102205 |
| Author | Gan, Yanglan Bai, Yanke Xu, Guangwei Han, Songhua Feng, Xiangyang |
| Author_xml | – sequence: 1 givenname: Guangwei surname: Xu fullname: Xu, Guangwei email: gwxu@dhu.edu.cn – sequence: 2 givenname: Songhua surname: Han fullname: Han, Songhua – sequence: 3 givenname: Yanke surname: Bai fullname: Bai, Yanke – sequence: 4 givenname: Xiangyang surname: Feng fullname: Feng, Xiangyang email: fengxy@dhu.edu.cn – sequence: 5 givenname: Yanglan surname: Gan fullname: Gan, Yanglan email: ylgan@dhu.edu.cn |
| BookMark | eNp9kM1qwzAQhEVJoUnaF-jJ0LNTSbYsGXop6S8EcmnPQpbXroxjpZISyNtXrnvqIZddGObbZWaBZoMdAKFbglcEk-K-W2nrYUUxJVGgFLMLNCeC07SgWMzQPJp4muNcXKGF9x3GhBdCzNH2SQWVBNUmDva90rCDISSqb60z4WuXNNYl9WgxQ4A2aqfkCM40Rqtg7BDlRPf2UCc-WKdauEaXjeo93PztJfp8ef5Yv6Wb7ev7-nGTappnIc2aOmMU85wwUIUuBYujwaSsgeUiL3nTkCyrykpnlRAa5wAVzxkuGC-J4jpborvp7t7Z7wP4IDt7cEN8KSnDGeGUYBZddHJpZ7130Mi9MzvlTpJgORYnOzkWJ8fi5FRchMQ_SJvwmzY4Zfrz6MOEQox-NOCk1wYGDbVxoIOsrTmH_wDZLYqd |
| CitedBy_id | crossref_primary_10_1016_j_cose_2022_103002 crossref_primary_10_1007_s12065_021_00621_x crossref_primary_10_1080_09537287_2022_2157746 crossref_primary_10_1109_ACCESS_2022_3176754 crossref_primary_10_3390_electronics12030717 crossref_primary_10_1007_s13132_024_01994_x crossref_primary_10_1109_ACCESS_2023_3240066 |
| Cites_doi | 10.1109/TIFS.2014.2384391 10.1016/j.jss.2015.11.044 10.1109/TPDS.2017.2784423 10.1109/TIFS.2017.2746000 10.1023/A:1008354106356 10.1109/ACCESS.2017.2776275 10.1016/j.ins.2015.09.004 10.1109/TKDE.2011.62 10.1109/TIFS.2018.2850312 10.1109/TIFS.2017.2695449 10.1109/TCC.2014.2299807 10.1109/TPDS.2010.183 10.1109/TDSC.2018.2829880 10.1109/TIFS.2016.2528500 |
| ContentType | Journal Article |
| Copyright | 2021 Elsevier Ltd Copyright Elsevier Sequoia S.A. Apr 2021 |
| Copyright_xml | – notice: 2021 Elsevier Ltd – notice: Copyright Elsevier Sequoia S.A. Apr 2021 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D |
| DOI | 10.1016/j.cose.2021.102205 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | ProQuest Criminal Justice (Alumni) |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-6208 |
| ExternalDocumentID | 10_1016_j_cose_2021_102205 S0167404821000298 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD AFXIZ AGCQF AGRNS BNPGV JQ2 K7. L7M L~C L~D SSH |
| ID | FETCH-LOGICAL-c243t-3fd35207415ea6c9856c9f019de548497ff133b9bc3b88c04eeb745065791a7c3 |
| IEDL.DBID | .~1 |
| ISSN | 0167-4048 |
| IngestDate | Fri Jul 25 02:30:41 EDT 2025 Thu Apr 24 22:51:42 EDT 2025 Thu Oct 02 04:27:33 EDT 2025 Fri Feb 23 02:48:19 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Private key replacement 99-00 00-01 Reactive replacement Data tag replacement Proactive replacement Homomorphic encryption |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c243t-3fd35207415ea6c9856c9f019de548497ff133b9bc3b88c04eeb745065791a7c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2503172105 |
| PQPubID | 46289 |
| ParticipantIDs | proquest_journals_2503172105 crossref_primary_10_1016_j_cose_2021_102205 crossref_citationtrail_10_1016_j_cose_2021_102205 elsevier_sciencedirect_doi_10_1016_j_cose_2021_102205 |
| PublicationCentury | 2000 |
| PublicationDate | April 2021 2021-04-00 20210401 |
| PublicationDateYYYYMMDD | 2021-04-01 |
| PublicationDate_xml | – month: 04 year: 2021 text: April 2021 |
| PublicationDecade | 2020 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Computers & security |
| PublicationYear | 2021 |
| Publisher | Elsevier Ltd Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
| References | Omote, Thao (bib0017) 2014 Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song (bib0002) 2007 Yu, Wang (bib0034) 2017; 12 Shen, Qin, Yu, Hao, Hu (bib0022) 2019; 14 Merkle (bib0016) 1987 Guan, Ren, Zhang (bib0008) 2015; 380 Sookhak, Gani, Khan (bib0024) 2014; 380 Wang, Wang, Ren, Lou (bib0029) 2010 Deswarte, Quisquater, Saidane (bib0005) 2003 Peng, Zhou, Qiang Wang, Xu (bib0018) 2017; 5 Yu, Ren, Wang (bib0033) 2017; 10 Erway, Küpçü, Papamanthou, Tamassia (bib0006) 2009 Huang, Liu, Xian (bib0010) 2014 Ren, Yang, Wang, Fang (bib0020) 2014 Wang, Wang, Ren, Lou, Li (bib0030) 2011; 22 Shacham, Waters (bib0021) 2008 Sookhak, Yu, Zomaya (bib0025) 2018; 29 Wang, Li, Li (bib0027) 2014; 2 Fu, Yu, Zhang, Wang, Huang (bib0007) 2017 Ren, Shen, Wang, Fang (bib0019) 2015 Thao, Kho, Lim (bib0026) 2014 Yu, Wen (bib0035) 2014 Yu, Ren, Wang (bib0032) 2016; 11 Juels, Kaliski (bib0011) 2007 Wang, Wang, Ren (bib0028) 2009 Yang, Yu, Shen (bib0031) 2016; 113 Abo-alian, Badr, Tolba (bib0001) 2017 Lin, Chung, Han (bib0014) 2014 Shuang, Li, Zhikun, Yan (bib0023) 2015; 52 Ateniese, Pietro, Mancini, Tsudik (bib0003) 2008 Hao, Zhong, Yu (bib0009) 2011; 23 Limin Li, Wu (bib0013) 2017 Liu, Zic (bib0015) 2015; 1 Zuo, Shao, Liu, Wei, Ling (bib0037) 2018; 13 Koblitz, Menezes, Vanstone (bib0012) 2000; 19 Zhang, Yu, Hao, Wang, Ren (bib0036) 2018 Barsoum, Hasan (bib0004) 2017; 10 Sookhak (10.1016/j.cose.2021.102205_bib0025) 2018; 29 Yu (10.1016/j.cose.2021.102205_bib0033) 2017; 10 Abo-alian (10.1016/j.cose.2021.102205_bib0001) 2017 Koblitz (10.1016/j.cose.2021.102205_bib0012) 2000; 19 Lin (10.1016/j.cose.2021.102205_bib0014) 2014 Yang (10.1016/j.cose.2021.102205_bib0031) 2016; 113 Ren (10.1016/j.cose.2021.102205_bib0019) 2015 Shuang (10.1016/j.cose.2021.102205_bib0023) 2015; 52 Deswarte (10.1016/j.cose.2021.102205_bib0005) 2003 Ren (10.1016/j.cose.2021.102205_bib0020) 2014 Yu (10.1016/j.cose.2021.102205_bib0032) 2016; 11 Huang (10.1016/j.cose.2021.102205_bib0010) 2014 Shen (10.1016/j.cose.2021.102205_bib0022) 2019; 14 Zuo (10.1016/j.cose.2021.102205_bib0037) 2018; 13 Sookhak (10.1016/j.cose.2021.102205_bib0024) 2014; 380 Ateniese (10.1016/j.cose.2021.102205_bib0003) 2008 Yu (10.1016/j.cose.2021.102205_bib0035) 2014 Hao (10.1016/j.cose.2021.102205_bib0009) 2011; 23 Shacham (10.1016/j.cose.2021.102205_bib0021) 2008 Barsoum (10.1016/j.cose.2021.102205_bib0004) 2017; 10 Limin Li (10.1016/j.cose.2021.102205_bib0013) 2017 Liu (10.1016/j.cose.2021.102205_bib0015) 2015; 1 Juels (10.1016/j.cose.2021.102205_bib0011) 2007 Guan (10.1016/j.cose.2021.102205_bib0008) 2015; 380 Thao (10.1016/j.cose.2021.102205_bib0026) 2014 Yu (10.1016/j.cose.2021.102205_bib0034) 2017; 12 Zhang (10.1016/j.cose.2021.102205_sbref0036) 2018 Peng (10.1016/j.cose.2021.102205_bib0018) 2017; 5 Wang (10.1016/j.cose.2021.102205_bib0029) 2010 Ateniese (10.1016/j.cose.2021.102205_bib0002) 2007 Fu (10.1016/j.cose.2021.102205_sbref0007) 2017 Merkle (10.1016/j.cose.2021.102205_bib0016) 1987 Omote (10.1016/j.cose.2021.102205_bib0017) 2014 Erway (10.1016/j.cose.2021.102205_bib0006) 2009 Wang (10.1016/j.cose.2021.102205_bib0027) 2014; 2 Wang (10.1016/j.cose.2021.102205_bib0030) 2011; 22 Wang (10.1016/j.cose.2021.102205_bib0028) 2009 |
| References_xml | – volume: 113 start-page: 130 year: 2016 end-page: 139 ident: bib0031 article-title: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability publication-title: J. Syst. Softw. – volume: 12 start-page: 1931 year: 2017 end-page: 1940 ident: bib0034 article-title: Strong key-exposure resilient auditing for secure cloud storage publication-title: IEEE Trans. Inf. ForensicsSecur. – volume: 23 start-page: 1432 year: 2011 end-page: 1437 ident: bib0009 article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability publication-title: IEEE Trans. Knowl. Data Eng. – volume: 22 start-page: 847 year: 2011 end-page: 859 ident: bib0030 article-title: Enabling public auditability and data dynamics for storage security in cloud computing publication-title: IEEE Trans. Parallel Distrib.Syst. – year: 2017 ident: bib0007 article-title: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users publication-title: IEEE Transactions on Big Data – start-page: 710 year: 2014 end-page: 713 ident: bib0020 article-title: Attributed based provable data possession in public cloud storage publication-title: Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) – start-page: 213 year: 2009 end-page: 222 ident: bib0006 article-title: Dynamic provable data possession publication-title: Proceedings of the 16th ACM Conference on Computer and Communications Security – start-page: 1115 year: 2017 end-page: 1121 ident: bib0013 article-title: FMR-PDP: flexible multiple-replica provable data possession in cloud storage publication-title: 2017 IEEE Symposium on Computers and Communications (ISCC) – start-page: 464 year: 2014 end-page: 472 ident: bib0026 article-title: SW-POR: a novel POR scheme using Slepian-Wolf coding for cloud storage publication-title: Ubiquitous Intelligence and Computing 2014 IEEE 11th Intl Conf on and IEEE 11th Intl Conf on and Autonomic and Trusted Computing, and IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom) – volume: 13 start-page: 186 year: 2018 end-page: 196 ident: bib0037 article-title: Fine-grained two-factor protection mechanism for data sharing in cloud storage publication-title: IEEE Trans. Inf. ForensicsSecur. – volume: 2 start-page: 43 year: 2014 end-page: 56 ident: bib0027 article-title: Oruta: privacy-preserving public auditing for shared data in the cloud publication-title: IEEE Trans. Cloud Comput. – start-page: 316 year: 2014 end-page: 325 ident: bib0014 article-title: Novel polynomial basis and its application to reed-solomon erasure codes publication-title: IEEE Symp. Found. Comput. Sci. – volume: 380 start-page: 101 year: 2014 end-page: 116 ident: bib0024 article-title: Dynamic remote data auditing for securing big data storage in cloud computing publication-title: Inf. Sci. – start-page: 712 year: 2014 end-page: 717 ident: bib0010 article-title: Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage publication-title: 2014 IEEE International Conference on Communications Workshops (ICC) – start-page: 1 year: 2003 end-page: 11 ident: bib0005 article-title: Remote integrity checking publication-title: Proceedings of IFIP Advances in Information and Communication Technology – start-page: 1 year: 2009 end-page: 9 ident: bib0028 article-title: Ensuring data storage security in cloud computing publication-title: 17th International Workshop on Quality of Service (IWQoS) – volume: 10 start-page: 1167 year: 2017 end-page: 1179 ident: bib0033 article-title: Enabling cloud storage auditing with key-exposure resistance publication-title: IEEE Trans. Inf. ForensicsSecur. – year: 2010 ident: bib0029 article-title: Privacy-preserving public auditing for data storage security in cloud computing publication-title: Proceedings of IEEE INFOCOM 2010 – start-page: 1 year: 2008 end-page: 10 ident: bib0003 article-title: Scalable and efficient provable data possession publication-title: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks – volume: 5 start-page: 26990 year: 2017 end-page: 27001 ident: bib0018 article-title: Identity-based public multi-replica provable data possession publication-title: IEEE Access – year: 2018 ident: bib0036 article-title: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data publication-title: IEEE Transactions on Dependable and Secure Computing – volume: 10 start-page: 485 year: 2017 end-page: 497 ident: bib0004 article-title: Provable multicopy dynamic data possession in cloud computing systems publication-title: IEEE Trans. Inf. ForensicsSecur. – volume: 14 start-page: 331 year: 2019 end-page: 346 ident: bib0022 article-title: Enabling identity-based integrity auditing and data-sharing with sensitive information hiding for secure cloud storage publication-title: IEEE Trans. Inf. ForensicsSecur. – volume: 1 start-page: 897 year: 2015 end-page: 904 ident: bib0015 article-title: Proofs of encrypted data retrievability with probabilistic and homomorphic message authenticators publication-title: 2015 IEEE Trustcom/BigDataSE/ISPA – start-page: 597 year: 2014 end-page: 603 ident: bib0035 article-title: MF-PDP: multi-function provable data possession scheme in cloud computing publication-title: IEEE International Conference on Cloud Computing and Intelligence Systems – start-page: 98 year: 2014 end-page: 105 ident: bib0017 article-title: A new efficient and secure POR scheme based on network coding publication-title: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications – volume: 11 start-page: 1362 year: 2016 end-page: 1375 ident: bib0032 article-title: Enabling cloud storage auditing with verifiable outsourcing of key updates publication-title: IEEE Trans. Inf. ForensicsSecur. – start-page: 90 year: 2008 end-page: 107 ident: bib0021 article-title: Compact proofs of retrievability publication-title: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security – start-page: 369 year: 1987 end-page: 378 ident: bib0016 article-title: A digital signature based on a conventional encryption function publication-title: LNCS 293: Proc of Advances in Cryptology-CRYPTO’87 – volume: 29 start-page: 999 year: 2018 end-page: 1012 ident: bib0025 article-title: Auditing big data storage in cloud computing using divide and conquer tables publication-title: IEEE Trans. Parallel Distrib.Syst. – start-page: 131 year: 2015 end-page: 134 ident: bib0019 article-title: Outsourced data tagging via authority and delegable auditing for cloud storage publication-title: 2015 International Carnahan Conference on Security Technology (ICCST) – volume: 19 start-page: 173 year: 2000 end-page: 193 ident: bib0012 article-title: The state of elliptic curve cryptography publication-title: Des. Codes Cryptogr. – start-page: 598 year: 2007 end-page: 609 ident: bib0002 article-title: Provable data possession at untrusted stores publication-title: Proceedings of the 14th ACM Conference on Computer and Communications Security – volume: 52 start-page: 1862 year: 2015 end-page: 1872 ident: bib0023 article-title: A grid-based data integrity verification method in cloud storage publication-title: Comput. Res. Dev. – volume: 380 start-page: 203 year: 2015 end-page: 223 ident: bib0008 article-title: Symmetric-key based proofs of retrievability supporting public verification publication-title: 20th European Symposium on Research in Computer Security (ESORICS 2015) – start-page: 1 year: 2017 end-page: 21 ident: bib0001 article-title: Integrity as a service for replicated data on the cloud publication-title: Concurrency Comput. – start-page: 584 year: 2007 end-page: 597 ident: bib0011 article-title: PORs: proof of retrievability for large files publication-title: Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS’07) – start-page: 1 year: 2003 ident: 10.1016/j.cose.2021.102205_bib0005 article-title: Remote integrity checking – volume: 10 start-page: 485 issue: 3 year: 2017 ident: 10.1016/j.cose.2021.102205_bib0004 article-title: Provable multicopy dynamic data possession in cloud computing systems publication-title: IEEE Trans. Inf. ForensicsSecur. doi: 10.1109/TIFS.2014.2384391 – volume: 10 start-page: 1167 issue: 6 year: 2017 ident: 10.1016/j.cose.2021.102205_bib0033 article-title: Enabling cloud storage auditing with key-exposure resistance publication-title: IEEE Trans. Inf. ForensicsSecur. – volume: 113 start-page: 130 issue: C year: 2016 ident: 10.1016/j.cose.2021.102205_bib0031 article-title: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2015.11.044 – start-page: 1115 year: 2017 ident: 10.1016/j.cose.2021.102205_bib0013 article-title: FMR-PDP: flexible multiple-replica provable data possession in cloud storage – year: 2010 ident: 10.1016/j.cose.2021.102205_bib0029 article-title: Privacy-preserving public auditing for data storage security in cloud computing – start-page: 710 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0020 article-title: Attributed based provable data possession in public cloud storage – volume: 29 start-page: 999 issue: 5 year: 2018 ident: 10.1016/j.cose.2021.102205_bib0025 article-title: Auditing big data storage in cloud computing using divide and conquer tables publication-title: IEEE Trans. Parallel Distrib.Syst. doi: 10.1109/TPDS.2017.2784423 – volume: 13 start-page: 186 issue: 1 year: 2018 ident: 10.1016/j.cose.2021.102205_bib0037 article-title: Fine-grained two-factor protection mechanism for data sharing in cloud storage publication-title: IEEE Trans. Inf. ForensicsSecur. doi: 10.1109/TIFS.2017.2746000 – volume: 19 start-page: 173 issue: 2 year: 2000 ident: 10.1016/j.cose.2021.102205_bib0012 article-title: The state of elliptic curve cryptography publication-title: Des. Codes Cryptogr. doi: 10.1023/A:1008354106356 – volume: 5 start-page: 26990 year: 2017 ident: 10.1016/j.cose.2021.102205_bib0018 article-title: Identity-based public multi-replica provable data possession publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2776275 – volume: 380 start-page: 101 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0024 article-title: Dynamic remote data auditing for securing big data storage in cloud computing publication-title: Inf. Sci. doi: 10.1016/j.ins.2015.09.004 – start-page: 369 year: 1987 ident: 10.1016/j.cose.2021.102205_bib0016 article-title: A digital signature based on a conventional encryption function – start-page: 316 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0014 article-title: Novel polynomial basis and its application to reed-solomon erasure codes publication-title: IEEE Symp. Found. Comput. Sci. – volume: 23 start-page: 1432 issue: 9 year: 2011 ident: 10.1016/j.cose.2021.102205_bib0009 article-title: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/TKDE.2011.62 – volume: 380 start-page: 203 year: 2015 ident: 10.1016/j.cose.2021.102205_bib0008 article-title: Symmetric-key based proofs of retrievability supporting public verification – year: 2017 ident: 10.1016/j.cose.2021.102205_sbref0007 article-title: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users publication-title: IEEE Transactions on Big Data – volume: 14 start-page: 331 issue: 2 year: 2019 ident: 10.1016/j.cose.2021.102205_bib0022 article-title: Enabling identity-based integrity auditing and data-sharing with sensitive information hiding for secure cloud storage publication-title: IEEE Trans. Inf. ForensicsSecur. doi: 10.1109/TIFS.2018.2850312 – start-page: 597 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0035 article-title: MF-PDP: multi-function provable data possession scheme in cloud computing – start-page: 1 year: 2008 ident: 10.1016/j.cose.2021.102205_bib0003 article-title: Scalable and efficient provable data possession – volume: 12 start-page: 1931 issue: 8 year: 2017 ident: 10.1016/j.cose.2021.102205_bib0034 article-title: Strong key-exposure resilient auditing for secure cloud storage publication-title: IEEE Trans. Inf. ForensicsSecur. doi: 10.1109/TIFS.2017.2695449 – start-page: 1 year: 2017 ident: 10.1016/j.cose.2021.102205_bib0001 article-title: Integrity as a service for replicated data on the cloud publication-title: Concurrency Comput. – volume: 52 start-page: 1862 issue: 8 year: 2015 ident: 10.1016/j.cose.2021.102205_bib0023 article-title: A grid-based data integrity verification method in cloud storage publication-title: Comput. Res. Dev. – start-page: 598 year: 2007 ident: 10.1016/j.cose.2021.102205_bib0002 article-title: Provable data possession at untrusted stores – volume: 2 start-page: 43 issue: 1 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0027 article-title: Oruta: privacy-preserving public auditing for shared data in the cloud publication-title: IEEE Trans. Cloud Comput. doi: 10.1109/TCC.2014.2299807 – volume: 22 start-page: 847 issue: 5 year: 2011 ident: 10.1016/j.cose.2021.102205_bib0030 article-title: Enabling public auditability and data dynamics for storage security in cloud computing publication-title: IEEE Trans. Parallel Distrib.Syst. doi: 10.1109/TPDS.2010.183 – start-page: 213 year: 2009 ident: 10.1016/j.cose.2021.102205_bib0006 article-title: Dynamic provable data possession – start-page: 98 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0017 article-title: A new efficient and secure POR scheme based on network coding – start-page: 712 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0010 article-title: Enabling dynamic proof of retrievability in regenerating-coding-based cloud storage – start-page: 464 year: 2014 ident: 10.1016/j.cose.2021.102205_bib0026 article-title: SW-POR: a novel POR scheme using Slepian-Wolf coding for cloud storage – start-page: 1 year: 2009 ident: 10.1016/j.cose.2021.102205_bib0028 article-title: Ensuring data storage security in cloud computing – year: 2018 ident: 10.1016/j.cose.2021.102205_sbref0036 article-title: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2018.2829880 – start-page: 131 year: 2015 ident: 10.1016/j.cose.2021.102205_bib0019 article-title: Outsourced data tagging via authority and delegable auditing for cloud storage – volume: 1 start-page: 897 year: 2015 ident: 10.1016/j.cose.2021.102205_bib0015 article-title: Proofs of encrypted data retrievability with probabilistic and homomorphic message authenticators – start-page: 584 year: 2007 ident: 10.1016/j.cose.2021.102205_bib0011 article-title: PORs: proof of retrievability for large files – start-page: 90 year: 2008 ident: 10.1016/j.cose.2021.102205_bib0021 article-title: Compact proofs of retrievability – volume: 11 start-page: 1362 issue: 6 year: 2016 ident: 10.1016/j.cose.2021.102205_bib0032 article-title: Enabling cloud storage auditing with verifiable outsourcing of key updates publication-title: IEEE Trans. Inf. ForensicsSecur. doi: 10.1109/TIFS.2016.2528500 |
| SSID | ssj0017688 |
| Score | 2.3562186 |
| Snippet | Data integrity verification is an important technical method to detect the integrity of remote cloud storage data. At present, the existing data integrity... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 102205 |
| SubjectTerms | Algorithms Cloud computing Cryptography Data integrity Data storage Data tag replacement Data transmission Downloading Encryption Homomorphic encryption Integrity Outsourcing Private key replacement Proactive replacement Reactive replacement Tags Verification |
| Title | Data tag replacement algorithm for data integrity verification in cloud storage |
| URI | https://dx.doi.org/10.1016/j.cose.2021.102205 https://www.proquest.com/docview/2503172105 |
| Volume | 103 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) customDbUrl: eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AKRWK dateStart: 19820101 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqsrDwRhRK5YENhebhxPFYFaoCogxQqZtlu04pKm1V0pXfzl3iVAKhDiyRYtlRdD6fv7O_uyPkiluLKMT3VGrBQUnwklBw4enM8kz72liNwclPg6Q_ZA-jeFQj3SoWBmmVzvaXNr2w1q6l7aTZXk6n7ZeCQA8KGOIRdSgw4JcxjlUMbr42NI8A4HS6ye8NvV3gTMnxQk44-IhhgBkMQixh9_fm9MtMF3tP74DsOdBIO-V_HZKanR-R_aogA3Xr85g836pc0VxN6MoWZCs8-qNqNlmspvnbBwWASpESSsskEQDAKWgykoWK-YFmamaL9ZgiZRIMzQkZ9u5eu33PVUzwTMii3IuyMQCqAiVYlRiRxvDIAMWNLXgmTPAsA59UC20inabGZ9ZqzmKAIVwEipvolNTni7k9IzS2wihhAcBlEUtYom2gVWD8sTKCAQZrkKASlTQunThWtZjJijf2LlG8EsUrS_E2yPVmzLJMprG1d1zNgPyhEhKs_dZxzWq6pFuQnxKQXoTerh-f__OzF2QX30rWTpPU89XaXgIgyXWr0LgW2encP_YH32EH3rE |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LTwIxEG4QD3rxbURRe_BmVvbRffRoUIIKeBASbk1buohBILhc_e3O7HZJNMaDlz10281mZjr9pv06Q8hVbAyiENeRiYEAJcJDQh5zR6UmTpWrtFF4Obnbi9oD9jgMhxXSLO_CIK3S-v7Cp-fe2rY0rDQbi8mk8ZIT6MEAfdyi9nmyQTZZ6McYgd18rnkeHuDpZJ3gG7rbmzMFyQtJ4RAk-h6mMPCxht3vq9MPP50vPq09smNRI70tfmyfVMzsgOyWFRmonaCH5PlOZpJmckyXJmdb4d4fldPxfDnJXt8pIFSKnFBaZIkABE7BlJEtlCsImqmezlcjipxJ8DRHZNC67zfbji2Z4GifBZkTpCNAVDlMMDLSPAnhkQKMGxkITRiP0xSCUsWVDlSSaJcZo2IWAg6JuSdjHRyT6mw-MyeEhoZryQ0guDRgEYuU8ZT0tDuSmjMAYTXilaIS2uYTx7IWU1ESx94EilegeEUh3hq5Xo9ZFNk0_uwdlhoQ32xCgLv_c1y9VJewM_JDANQLMNx1w9N_fvaSbLX73Y7oPPSezsg2vikoPHVSzZYrcw7oJFMXufV9AaWj4EY |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Data+tag+replacement+algorithm+for+data+integrity+verification+in+cloud+storage&rft.jtitle=Computers+%26+security&rft.au=Xu%2C+Guangwei&rft.au=Han%2C+Songhua&rft.au=Bai%2C+Yanke&rft.au=Feng%2C+Xiangyang&rft.date=2021-04-01&rft.issn=0167-4048&rft.volume=103&rft.spage=102205&rft_id=info:doi/10.1016%2Fj.cose.2021.102205&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cose_2021_102205 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |