A generic integrity verification algorithm of version files for cloud deduplication data storage

Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to...

Full description

Saved in:
Bibliographic Details
Published inEURASIP Journal on Information Security Vol. 2018; no. 1; pp. 1 - 15
Main Authors Xu, Guangwei, Lai, Miaolin, Li, Jing, Sun, Li, Shi, Xiujin
Format Journal Article
LanguageEnglish
Published Cham Springer International Publishing 20.09.2018
Springer Nature B.V
SpringerOpen
Subjects
Online AccessGet full text
ISSN2510-523X
1687-4161
2510-523X
1687-417X
DOI10.1186/s13635-018-0083-x

Cover

Abstract Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to safeguard these data integrity. However, the cloud deduplication storage only focuses on file/chunk level to store one copy of the same data hosted by different data owners, and is not concerned with the same part of different data, e.g., a series of version files. We propose an integrity verification algorithm of different version files. The algorithm establishes the generic storage model of different version control methods to improve the universality of data verification. Then, the methods of verification tags and proofs generating are improved based on the index pointers corresponding to the storage relationship in the version groups and chained keys. Finally, the random diffusion extraction based on the random data sampling in the version group is proposed to improve the verification efficiency. The results of theoretical and experimental analysis indicate that the algorithm can achieve fast and large-scale verification for different version data.
AbstractList Abstract Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to safeguard these data integrity. However, the cloud deduplication storage only focuses on file/chunk level to store one copy of the same data hosted by different data owners, and is not concerned with the same part of different data, e.g., a series of version files. We propose an integrity verification algorithm of different version files. The algorithm establishes the generic storage model of different version control methods to improve the universality of data verification. Then, the methods of verification tags and proofs generating are improved based on the index pointers corresponding to the storage relationship in the version groups and chained keys. Finally, the random diffusion extraction based on the random data sampling in the version group is proposed to improve the verification efficiency. The results of theoretical and experimental analysis indicate that the algorithm can achieve fast and large-scale verification for different version data.
Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to safeguard these data integrity. However, the cloud deduplication storage only focuses on file/chunk level to store one copy of the same data hosted by different data owners, and is not concerned with the same part of different data, e.g., a series of version files. We propose an integrity verification algorithm of different version files. The algorithm establishes the generic storage model of different version control methods to improve the universality of data verification. Then, the methods of verification tags and proofs generating are improved based on the index pointers corresponding to the storage relationship in the version groups and chained keys. Finally, the random diffusion extraction based on the random data sampling in the version group is proposed to improve the verification efficiency. The results of theoretical and experimental analysis indicate that the algorithm can achieve fast and large-scale verification for different version data.
ArticleNumber 12
Author Shi, Xiujin
Li, Jing
Sun, Li
Lai, Miaolin
Xu, Guangwei
Author_xml – sequence: 1
  givenname: Guangwei
  surname: Xu
  fullname: Xu, Guangwei
  email: dh.xuguangwei@gmail.com
  organization: School of Computer Science and Technology, Donghua University
– sequence: 2
  givenname: Miaolin
  surname: Lai
  fullname: Lai, Miaolin
  organization: School of Computer Science and Technology, Donghua University
– sequence: 3
  givenname: Jing
  surname: Li
  fullname: Li, Jing
  organization: School of Computer Science and Technology, Donghua University
– sequence: 4
  givenname: Li
  surname: Sun
  fullname: Sun, Li
  organization: School of Computer Science and Technology, Donghua University
– sequence: 5
  givenname: Xiujin
  surname: Shi
  fullname: Shi, Xiujin
  organization: School of Computer Science and Technology, Donghua University
BookMark eNqNkEtv1TAQhS1UJErpD2BniXVgbMePLKuKR6VKbEBiZxw_gq_c-GI70Pvvm9uUh5BArDw-M9-x5zxFJ3OePULPCbwkRIlXlTDBeAdEdQCKdbeP0CnlBDpO2aeT3-on6LzWHQBQBWoAfoo-X-DJz75Ei-Pc_FRiO-Bv6z1Ea1rMMzZpyqv65QbncOzUoxhi8hWHXLBNeXHYebfs0w_EmWZwbbmYyT9Dj4NJ1Z8_nGfo45vXHy7fddfv315dXlx3tqe8dcIyHgLvrbHKDtyE0SgHEEbhKSVW0MEKxeRImR0FH2WvpAVJLQsAngwDO0NXm6_LZqf3Jd6YctDZRH0v5DJpU1q0yWs_SjkS54R0spdqGAVVKvQhEDVQqsLqRTevZd6bw3eT0k9DAvoYud4i12vk-hi5vl2hFxu0L_nr4mvTu7yUed1ZU0KACEk4WafINmVLrrX48F_O8g_GxnafdCsmpn-SD4vU9ZV58uXXn_4O3QHBNLU8
CitedBy_id crossref_primary_10_1155_2022_3242092
crossref_primary_10_1007_s11042_022_14104_3
Cites_doi 10.1109/TPDS.2012.66
10.1109/TIFS.2016.2631951
10.1504/IJHPCN.2016.076264
10.1023/A:1008354106356
10.1109/TIFS.2016.2549002
10.1007/BFb0054130
10.1109/TPDS.2012.278
10.1145/1315245.1315318
10.1145/1653662.1653688
ContentType Journal Article
Copyright The Author(s) 2018
EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2018
– notice: EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
3V.
7SC
7XB
8AL
8FD
8FE
8FG
8FK
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
DOA
DOI 10.1186/s13635-018-0083-x
DatabaseName Springer Nature Link OA Free Journals
CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
DatabaseTitleList
Computer Science Database

Database_xml – sequence: 1
  dbid: C6C
  name: Springer Nature OA Free Journals
  url: http://www.springeropen.com/
  sourceTypes: Publisher
– sequence: 2
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 4
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 2510-523X
1687-417X
EndPage 15
ExternalDocumentID oai_doaj_org_article_eb77b1dd67d74789b6288f4ff189228f
10.1186/s13635-018-0083-x
10_1186_s13635_018_0083_x
GrantInformation_xml – fundername: Shanghai Education and Scientific Research Project
  grantid: C160076
GroupedDBID -A0
.4S
.DC
2WC
3V.
4.4
40G
5VS
6KP
8FE
8FG
8R4
8R5
AAKPC
ABUWG
ACGFS
ADBBV
ADINQ
ADMLS
AFKRA
AHBYD
AHYZX
ALMA_UNASSIGNED_HOLDINGS
AMKLP
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C24
C6C
CCPQU
CS3
DWQXO
EDO
EIS
GNUQQ
GROUPED_DOAJ
HCIFZ
HZ~
K6V
K7-
KQ8
M0N
M~E
OK1
P62
PQQKQ
PROAC
Q2X
RHU
SEG
TR2
TUS
U2A
AAYXX
CITATION
OVT
PUEGO
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQUKI
PRINS
Q9U
2VQ
ADTOC
C1A
H13
IL9
O9-
UNPAY
ID FETCH-LOGICAL-c425t-6c35ff54cac8c95afba8d00fb6e221c629c6837b23cb65b7487c072c3f00e1993
IEDL.DBID BENPR
ISSN 2510-523X
1687-4161
IngestDate Fri Oct 03 12:39:16 EDT 2025
Tue Aug 19 22:13:54 EDT 2025
Sat Oct 11 05:45:20 EDT 2025
Wed Oct 01 02:56:13 EDT 2025
Thu Apr 24 23:12:26 EDT 2025
Fri Feb 21 02:32:16 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Random diffusion extraction
Version file storage
Version group
Data integrity verification
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c425t-6c35ff54cac8c95afba8d00fb6e221c629c6837b23cb65b7487c072c3f00e1993
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://proxy.k.utb.cz/login?url=https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-018-0083-x
PQID 2110167151
PQPubID 237294
PageCount 15
ParticipantIDs doaj_primary_oai_doaj_org_article_eb77b1dd67d74789b6288f4ff189228f
unpaywall_primary_10_1186_s13635_018_0083_x
proquest_journals_2110167151
crossref_primary_10_1186_s13635_018_0083_x
crossref_citationtrail_10_1186_s13635_018_0083_x
springer_journals_10_1186_s13635_018_0083_x
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-09-20
PublicationDateYYYYMMDD 2018-09-20
PublicationDate_xml – month: 09
  year: 2018
  text: 2018-09-20
  day: 20
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
– name: New York
PublicationTitle EURASIP Journal on Information Security
PublicationTitleAbbrev EURASIP J. on Info. Security
PublicationYear 2018
Publisher Springer International Publishing
Springer Nature B.V
SpringerOpen
Publisher_xml – name: Springer International Publishing
– name: Springer Nature B.V
– name: SpringerOpen
References Jea, Feng, Yau, Chen, Dai (CR18) 1998
Ismail, Kiennert, Leneutre, Chen (CR11) 2016; 11
Deswarte, Quisquater, Saidane (CR5) 2003
Wang, Wang, Ren, Lou (CR2) 2010
Liu, Sun, Lou, Pei, Zhang (CR13) 2017
Xu, Yang, Yan, Gan (CR1) 2016; 10
Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song (CR3) 2007
Ateniese, Pietro, Mancini, Tsudik (CR6) 2008
Wang, Wang, Li, Ren, Lou (CR9) 2009
Yuan, Yu (CR16) 2013
Yang, Jia (CR10) 2013; 24
Xu (CR19) 2016; 9
Erway, Küpçü, Papamanthou, Tamassia (CR7) 2009
Grandi (CR17) 2013
Zhu, Hu, Ahn, Yu (CR23) 2012; 23
(CR25) 1998
Ghobadi, Mahdizadeh, Kee, Wei, Ghods (CR21) 2011
Wang, Wang, Ren, Lou (CR12) 2009
Hou, He, Zhao, Xie (CR20) 2010
Zhang, Xu, Liang, Li, Mu, Zhang (CR15) 2017; 12
Koblitz, Menezes, Vanstone (CR24) 2000; 19
TEZUKA, UDA, OKADA (CR22) 2012
Shacham, Waters (CR4) 2008
Juels, Kaliski (CR8) 2007
O’Sullivan (CR14) 2009
K. Yang (83_CR10) 2013; 24
G. Ateniese (83_CR6) 2008
S. TEZUKA (83_CR22) 2012
G. Xu (83_CR19) 2016; 9
C. Wang (83_CR12) 2009
C. Erway (83_CR7) 2009
F. Grandi (83_CR17) 2013
Z. Ismail (83_CR11) 2016; 11
A. Ghobadi (83_CR21) 2011
M. Bellare (83_CR25) 1998
K. Jea (83_CR18) 1998
N. Koblitz (83_CR24) 2000; 19
S. Hou (83_CR20) 2010
A. Juels (83_CR8) 2007
G. Ateniese (83_CR3) 2007
Q. Wang (83_CR9) 2009
X. Liu (83_CR13) 2017
Y. Zhang (83_CR15) 2017; 12
G. Xu (83_CR1) 2016; 10
C. Wang (83_CR2) 2010
J. Yuan (83_CR16) 2013
Y. Deswarte (83_CR5) 2003
Y. Zhu (83_CR23) 2012; 23
H. Shacham (83_CR4) 2008
B. O’Sullivan (83_CR14) 2009
References_xml – start-page: 1
  year: 2009
  end-page: 9
  ident: CR12
  article-title: Ensuring data storage securityin cloud computing
  publication-title: Proceedings of the 17th International Workshop on Quality of Service
– volume: 23
  start-page: 2231
  issue: 12
  year: 2012
  end-page: 2244
  ident: CR23
  article-title: Cooperative provable data possession for integrity verification in multicloud storage
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2012.66
– start-page: 224
  year: 2013
  end-page: 232
  ident: CR17
  article-title: Dynamic multi-version ontology-based personalization
  publication-title: Proceedings of the Joint EDBT/ICDT Workshops
– start-page: 136
  year: 2010
  end-page: 139
  ident: CR20
  article-title: Research on threshold-based version hybrid storage model
  publication-title: Proceedings of the 2nd International Conference on Industrial and Information Systems
– year: 2017
  ident: CR13
  article-title: One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage
  publication-title: proceedings of IEEE INFOCOM 2017
– volume: 12
  start-page: 676
  issue: 3
  year: 2017
  end-page: 688
  ident: CR15
  article-title: Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation
  publication-title: IEEE Trans. Inf. Forensic Secur.
  doi: 10.1109/TIFS.2016.2631951
– volume: 9
  start-page: 218
  issue: 3
  year: 2016
  end-page: 229
  ident: CR19
  article-title: A probabilistic verification algorithm against spoofing attacks on remote data storage
  publication-title: Int. J. High Perform. Comput. Netw.
  doi: 10.1504/IJHPCN.2016.076264
– volume: 19
  start-page: 173
  issue: 2
  year: 2000
  end-page: 193
  ident: CR24
  article-title: The state of elliptic curve cryptography
  publication-title: Des. Codes Crypt.
  doi: 10.1023/A:1008354106356
– start-page: 1043
  year: 2011
  end-page: 1048
  ident: CR21
  article-title: Pre-processing directory structure for improved rsync transfer performance
  publication-title: Proceedings of the 2th International Conference on Advanced Communication Technology
– volume: 11
  start-page: 1685
  issue: 8
  year: 2016
  end-page: 1699
  ident: CR11
  article-title: Auditing a cloud provider’s compliance with data backup requirements: a game theoretical analysis
  publication-title: IEEE Trans. Inf. Forensic Secur.
  doi: 10.1109/TIFS.2016.2549002
– year: 2009
  ident: CR14
  publication-title: Mercurial: the definitive guide
– start-page: 584
  year: 2007
  end-page: 597
  ident: CR8
  article-title: Pors: proof of retrievability for large files
  publication-title: Proceedings of the 14th ACM conference on Computer and communications security(CCS’07)
– start-page: 213
  year: 2009
  end-page: 222
  ident: CR7
  article-title: Dynamic provable data possession
  publication-title: Proceedings of the 16th ACM conference on Computer and communications security
– start-page: 598
  year: 2007
  end-page: 609
  ident: CR3
  article-title: Provable data possession at untrusted stores
  publication-title: Proceedings of the 14th ACM conference on Computer and Communications Security
– start-page: 23
  year: 2012
  end-page: 30
  ident: CR22
  article-title: Adec: assured deletion and verifiable version control for cloud storage
  publication-title: Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications
– start-page: 145
  year: 2013
  end-page: 153
  ident: CR16
  article-title: Secure and constant cost public cloud storage auditing with deduplication
  publication-title: Proceedings of IEEE Conference on Communications and Network Security (CNS)
– year: 2010
  ident: CR2
  article-title: Privacy-preserving public auditing for data storage security in cloud computing
  publication-title: proceedings of IEEE INFOCOM 2010
– start-page: 1
  year: 2003
  end-page: 11
  ident: CR5
  article-title: Remote integrity checking
  publication-title: Proceedings of IFIP Advances in Information and Communication Technology
– start-page: 236
  year: 1998
  end-page: 250
  ident: CR25
  article-title: Fast batch verification for modular exponentiation and digital signatures
  publication-title: Proceedings of Advances in Cryptology-EUROCRYPT’98
  doi: 10.1007/BFb0054130
– start-page: 369
  year: 1998
  end-page: 376
  ident: CR18
  article-title: A difference-based version model for oodbms
  publication-title: Proceedings of 1998 Asia Pacific Software Engineering Conference
– volume: 10
  start-page: 4703
  issue: 10
  year: 2016
  end-page: 4723
  ident: CR1
  article-title: A rapid locating protocol of corrupted data for cloud data storage
  publication-title: Ksii Trans. Internet Inf. Syst.
– start-page: 355
  year: 2009
  end-page: 370
  ident: CR9
  article-title: Enabling public verifiability and data dynamics for storage security in cloud computing
  publication-title: Proceedings of the 14th European Symposium on Research in Computer Security
– volume: 24
  start-page: 1717
  issue: 9
  year: 2013
  end-page: 1726
  ident: CR10
  article-title: An efficient and secure dynamic aduiting protocol for data storage in cloud computing
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2012.278
– start-page: 90
  year: 2008
  end-page: 107
  ident: CR4
  article-title: Compact proofs of retrievability
  publication-title: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Securit
– start-page: 1
  year: 2008
  end-page: 10
  ident: CR6
  article-title: Scalable and efficient provable data possession
  publication-title: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks
– start-page: 598
  volume-title: Proceedings of the 14th ACM conference on Computer and Communications Security
  year: 2007
  ident: 83_CR3
  doi: 10.1145/1315245.1315318
– start-page: 145
  volume-title: Proceedings of IEEE Conference on Communications and Network Security (CNS)
  year: 2013
  ident: 83_CR16
– start-page: 369
  volume-title: Proceedings of 1998 Asia Pacific Software Engineering Conference
  year: 1998
  ident: 83_CR18
– volume: 24
  start-page: 1717
  issue: 9
  year: 2013
  ident: 83_CR10
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2012.278
– volume-title: proceedings of IEEE INFOCOM 2010
  year: 2010
  ident: 83_CR2
– volume-title: Mercurial: the definitive guide
  year: 2009
  ident: 83_CR14
– start-page: 1
  volume-title: Proceedings of IFIP Advances in Information and Communication Technology
  year: 2003
  ident: 83_CR5
– start-page: 136
  volume-title: Proceedings of the 2nd International Conference on Industrial and Information Systems
  year: 2010
  ident: 83_CR20
– start-page: 355
  volume-title: Proceedings of the 14th European Symposium on Research in Computer Security
  year: 2009
  ident: 83_CR9
– volume-title: proceedings of IEEE INFOCOM 2017
  year: 2017
  ident: 83_CR13
– volume: 10
  start-page: 4703
  issue: 10
  year: 2016
  ident: 83_CR1
  publication-title: Ksii Trans. Internet Inf. Syst.
– start-page: 1043
  volume-title: Proceedings of the 2th International Conference on Advanced Communication Technology
  year: 2011
  ident: 83_CR21
– start-page: 1
  volume-title: Proceedings of the 17th International Workshop on Quality of Service
  year: 2009
  ident: 83_CR12
– start-page: 224
  volume-title: Proceedings of the Joint EDBT/ICDT Workshops
  year: 2013
  ident: 83_CR17
– start-page: 1
  volume-title: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks
  year: 2008
  ident: 83_CR6
– start-page: 23
  volume-title: Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications
  year: 2012
  ident: 83_CR22
– start-page: 213
  volume-title: Proceedings of the 16th ACM conference on Computer and communications security
  year: 2009
  ident: 83_CR7
  doi: 10.1145/1653662.1653688
– volume: 23
  start-page: 2231
  issue: 12
  year: 2012
  ident: 83_CR23
  publication-title: IEEE Trans. Parallel Distrib. Syst.
  doi: 10.1109/TPDS.2012.66
– start-page: 584
  volume-title: Proceedings of the 14th ACM conference on Computer and communications security(CCS’07)
  year: 2007
  ident: 83_CR8
– start-page: 236
  volume-title: Proceedings of Advances in Cryptology-EUROCRYPT’98
  year: 1998
  ident: 83_CR25
  doi: 10.1007/BFb0054130
– start-page: 90
  volume-title: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Securit
  year: 2008
  ident: 83_CR4
– volume: 19
  start-page: 173
  issue: 2
  year: 2000
  ident: 83_CR24
  publication-title: Des. Codes Crypt.
  doi: 10.1023/A:1008354106356
– volume: 11
  start-page: 1685
  issue: 8
  year: 2016
  ident: 83_CR11
  publication-title: IEEE Trans. Inf. Forensic Secur.
  doi: 10.1109/TIFS.2016.2549002
– volume: 9
  start-page: 218
  issue: 3
  year: 2016
  ident: 83_CR19
  publication-title: Int. J. High Perform. Comput. Netw.
  doi: 10.1504/IJHPCN.2016.076264
– volume: 12
  start-page: 676
  issue: 3
  year: 2017
  ident: 83_CR15
  publication-title: IEEE Trans. Inf. Forensic Secur.
  doi: 10.1109/TIFS.2016.2631951
SSID ssj0002808905
ssj0064073
Score 2.1069794
Snippet Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This...
Abstract Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s....
SourceID doaj
unpaywall
proquest
crossref
springer
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Communications Engineering
Control methods
Data integrity
Data integrity verification
Data sampling
Data storage
Engineering
Integrity
Networks
Random diffusion extraction
Security Science and Technology
Signal,Image and Speech Processing
Systems and Data Security
Version control
Version file storage
Version group
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT-QwDI4QF-CwPBa0AwPKgROoIk3bND0CYoSQ4AQSt5C4CQ91Z0Y7Mwv8e-y20x0ucNmrm1ZRPzu2Y-szY4cWMkhiryIVaIRZrouokNJHGorUCWU91MMmrm_U5V16dZ_dL4z6op6whh64-XEn3uW5i8tS5SVRvReO5uOGNIRY40d1oNNX6GIhmXqpr4xQJrpAmKpVSVvTjLU6mcQJOlpMo3VEMUj09skr1eT9nyLOrki6xlZmw7F9f7VVteCHBhvsRxtA8tNm45tsyQ-32Pp8OANvbfUnezjlj0Qp_Qy8oYTAcJuj3lJrUI0Gt9XjCKVPv_ko8L_NvRknnqYJx0iWQzWalbxEV9SVuDn1k3Lqp8RTaJvdDS5uzy-jdpxCBGiY00hBkoWQpWABkchscFaXQgSnvJQxKFmAwnTVyQScylyOqQyIXEIShPDU57fDloejof_FeOF0CT5Q9hPSWFoXcFGGAgQmS53rMTH_nQZarnEaeVGZOufQyjQIGETAEALmrceOulfGDdHGV4vPCKNuIXFk1wLUHNNqjvlOc3qsP0fYtIY7MZQPxyrHOKjHjueo_3v8xY6OO8X4fv-7_2P_e2xV1hpc4FHXZ8vTPzO_jxHS1B3UxvABfbAKuA
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: SpringerLink Journals (ICM)
  dbid: U2A
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT9wwELUqeqAc2kJbsUCRD5xAUR0ncZzjUhUhpPbUlbi59sTeIqUbxO4W-u8743wAUgXq1XESKzPjeeOZvGHsyEIBWepVogK1MCt1lVRS-kRDlTuhrIfYbOLrN3U-yy8ui8v-P-7lUO0-pCTjTh3NWqtPyzRD54ihr04INyQIHF8WxOaFSjyT0_FgRWqhKzFiYEpUZX0685-PeeSQIm__I7A55ke32OZ6cW3_3NqmeeCCzt6y1z125NNO2NvshV_ssDdDXwbem-kO23pAMviO_ZjyOXFLXwHvuCEQd3NUYKoRimLhtpm3OPrzF28D_90doHEibFpyhLQcmnZd8xp90pjr5lRYyqmwErej92x29uX75_Ok76uQAFroKlGQFSEUOVhAkRQ2OKtrIYJTXsoUlKxAYdzqZAZOFa7EmAZEKSELQngq-PvANhbtwu8yXjldgw8UBoU8ldYFnFTgQMjxBc5NmBg-roGedJx6XzQmBh9amU4eBuVhSB7mbsKOx1uuO8aNpyafksTGiUSWHQfam7npbc94V5YurWtV1tQtoHLUYhkXGFKNeqnDhB0M8ja9BS8NBcapKhEQTdjJoAP3l59Y0cmoJs-vf--_nr3PXsmouBVubgdsY3Wz9h8RE63cYbSBv_phA9I
  priority: 102
  providerName: Springer Nature
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5V2wNwoDzFQkE-cKLKNk_HOS6IqkKi6oGVlpOxHXtZGjbLJuH165nJC4pQERJXx1Ec-5vxN_FkPoCnyiQmCiz3uCMJs1RkXhaG1hMmi7XPlTWt2MTrM366iF8tk-UenA__wnxYV55tdqpab_vJrGbDCSXpSbXOu94pc3G8zV1n84IfV0GEOyfGxcIjUuEhq9znCbLzCewvzs7nb0ljDuFHcdeyP9z8432Xtqe2iv8l6jmelt6Aa81mq759UUXxy4Z0cgCfhlfp8lAuZk2tZ-b7b1Ue_-e73oKbPXtl8w5ut2HPbu7AwaAMwXpHcRfezdmK6lmvDevqUSDXZ2g0lJfUQoGpYlVi6_uPrHTsc_fRjlGRqIohjWamKJuc5bgPjufrjJJZGSVzogu8B4uTl29enHq9loNn0CvUHjdR4lwSG2UQBolyWonc953mNgwDw8PMcIyVdRgZzROdYhxl_DQ0kfN9S0mG92GyKTf2AbBMi9xYR6GXi4NQaYedEmxwMT5A6yn4wxJK0xc6J72NQrYBj-Cym0GJMyhpBuXXKTwbb9l2VT6u6vyccDF2pALdbUO5W8ne3qXVaaqDPOdpTgoFmSZZZxygCwTagnBTOBxQJYfFlxSMBzxFEjaFowEJPy9fMaKjEYx_H__Df-r9CK6HLdQydKiHMKl3jX2MPKzWT3rT-gG7oi_B
  priority: 102
  providerName: Unpaywall
Title A generic integrity verification algorithm of version files for cloud deduplication data storage
URI https://link.springer.com/article/10.1186/s13635-018-0083-x
https://www.proquest.com/docview/2110167151
https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-018-0083-x
https://doaj.org/article/eb77b1dd67d74789b6288f4ff189228f
UnpaywallVersion publishedVersion
Volume 2018
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064073
  issn: 2510-523X
  databaseCode: KQ8
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064073
  issn: 2510-523X
  databaseCode: KQ8
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: DOA
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0064073
  issn: 2510-523X
  databaseCode: ADMLS
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: M~E
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064073
  issn: 2510-523X
  databaseCode: BENPR
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064073
  issn: 2510-523X
  databaseCode: 8FG
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: Springer Nature HAS Fully OA
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: AAJSJ
  dateStart: 20071201
  isFulltext: true
  titleUrlDefault: https://www.springernature.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: Springer Nature OA Free Journals
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: C6C
  dateStart: 20071201
  isFulltext: true
  titleUrlDefault: http://www.springeropen.com/
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: Springer Open Access Hybrid - NESLI2 2011-2012
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064073
  issn: 2510-523X
  databaseCode: 40G
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://link.springer.com/
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002808905
  issn: 2510-523X
  databaseCode: C24
  dateStart: 20071201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 2510-523X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064073
  issn: 2510-523X
  databaseCode: U2A
  dateStart: 20111201
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3db9MwELe29gH2gECAKIzKDzwxRUucxHEeEMqqlakS1QRUGk_GduyCFJpubWH899w5H2Mv5eUeHEd27s6-O_vyO0LeKJOaOLI84A5LmGUiD3LGbCBMnuiQK2t8sYmPc36xSGZX6dUBmXf_wmBaZbcn-o26rA2ekZ9ioBLxDAzU-_V1gFWj8Ha1K6Gh2tIK5TsPMXZIhgyRsQZkeHY-v_yEUReH1YTefHu1GQl-uolisLcQTYsAXZHg9p5x8hj-9xzP_q70iDzYrdbqz29VVf-Yo-lj8qj1I2nRCP4JObCrp-RbQZcII_3D0AYGAlxsCrqK6UBeAlRVS_io7feftHb0V3NWRhGbaUPBe6WmqnclLcH89NfaFHNIKeZQws7zjCym518mF0FbQiEwsBi3ATdx6lyaGGWA-6lyWokyDJ3mlrHIcJYbDiGqZrHRPNUZhC8mzJiJXRhazO17TgaremVfEJprURrrMOJxScSUdtAphQaXwABaj0jY8U6aFl8cy1xU0scZgsuG3RLYLZHd8nZE3vavrBtwjX2dz1AgfUfExfYN9c1StstMWp1lOipLnpVYGCDXWE0ZJugiASoo3Igcd-KU7WLdyDvVGpGTTsR3j_fM6KTXgv_P_-X-oV-Rh8wrYg4b1zEZbG929jX4O1s9JodJ-AGomAIdFsXs82zcKja0TliClE_G_jwB6IIBHS7ml8XXv0pQBnM
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dT9RAEJ8gPKAPRqPGU9R90BdJQ7ttt-0DMaCQQ-BiDCS8Lft5mNTryd0J_HP-bc70C3k5n3htt-1mZnZmfrvT-QG8VyY1ceREIDxRmGV5ERScuyA3RaJDoZypySaOR2J4mnw9S89W4E_3LwyVVXY-sXbUtjK0R75FQCUSGQaoT9NfAbFG0elqR6GhWmoFu123GGt_7Dh0N1cI4WbbB19Q3x843987-TwMWpaBwKC9zgNh4tT7NDHK4ART5bXKbRh6LRznkRG8MAJRnOax0SLVGWb4Jsy4iX0YOip_w_c-gLUkTgoEf2u7e6Nv3wnlCVy9hB7ao9QoF1uzKMb4jug9Dyj1Ca7vBMOaM-BOotufzT6C9cVkqm6uVFn-E_72n8DjNm9lO42hPYUVN3kG5ztsTG2rfxjWtJ3AlJ7h2qDyo1rjTJVjFOL84ierPPvd7M0x6gU1Y5gtM1NWC8sshrv-GJ1RzSqjmk30dM_h9F6E-QJWJ9XEvQRW6Nwa5wlh-STiSnsclOIFn-AHtB5A2MlOmrafOdFqlLLGNbmQjbgliluSuOX1AD72j0ybZh7LBu-SQvqB1Ie7vlBdjmW7rKXTWaYja0VmiYig0MTejBP0UY4mn_sBbHTqlK1zmMlbUx7AZqfi29tLZrTZW8H_5_9q-affwfrw5PhIHh2MDl_DQ14bZYFOcwNW55cL9wZzrbl-2xo0g_P7XkN_AcJIOx4
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIgE9VCBAXdqCD3ChijZxEsc5INRSlpZCxYFKvbm2Yy9IYbN0d2n71_h1ncmr9LKcenWcxJr32OP5AF5rm9o4ciIQniDMMpkHOecukDZPTCi0szXYxNdjcXCSfD5NT1fgb3cXhsoqO5tYG-qisrRHPqREJRIZOqihb8sivu2P3k9_B4QgRSetHZxGIyJH7uoC07fZu8N95PUbzkcfv384CFqEgcCirM4DYePU-zSx2uLiUu2NlkUYeiMc55EVPLcCMzjDY2tEajKM7m2YcRv7MHRU-obfvQf3M-riTrfUR58ovxOot5Q3tIeokRTDWRSjZ8e8XQYU9ASXt9xgjRZwK8TtT2XX4OFiMtVXF7os_3F8o8ew3kasbLcRsSew4iZP4WyXjalh9U_LmoYTGMwz1AoqPKp5zXQ5RpLNf_xilWd_ml05Rl2gZgzjZGbLalGwAh1df4DOqFqVUbUm2rhncHInpHwOq5Nq4jaA5UYW1nnKrXwScW08TkpxwCf4A2MGEHa0U7btZE6AGqWqMxopVENuheRWRG51OYC3_SvTpo3Hssl7xJB-InXgrgeq87FqFVo5k2UmKgqRFQRBkBvCbcYF-kiisEs_gK2Onao1CzN1I8QD2OlYfPN4yYp2ein4__pfLP_1K3iAmqO-HB4fbcIjXstkjtZyC1bn5wu3jUHW3LyspZnB2V2rzzUitDi4
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5V2wNwoDzFQkE-cKLKNk_HOS6IqkKi6oGVlpOxHXtZGjbLJuH165nJC4pQERJXx1Ec-5vxN_FkPoCnyiQmCiz3uCMJs1RkXhaG1hMmi7XPlTWt2MTrM366iF8tk-UenA__wnxYV55tdqpab_vJrGbDCSXpSbXOu94pc3G8zV1n84IfV0GEOyfGxcIjUuEhq9znCbLzCewvzs7nb0ljDuFHcdeyP9z8432Xtqe2iv8l6jmelt6Aa81mq759UUXxy4Z0cgCfhlfp8lAuZk2tZ-b7b1Ue_-e73oKbPXtl8w5ut2HPbu7AwaAMwXpHcRfezdmK6lmvDevqUSDXZ2g0lJfUQoGpYlVi6_uPrHTsc_fRjlGRqIohjWamKJuc5bgPjufrjJJZGSVzogu8B4uTl29enHq9loNn0CvUHjdR4lwSG2UQBolyWonc953mNgwDw8PMcIyVdRgZzROdYhxl_DQ0kfN9S0mG92GyKTf2AbBMi9xYR6GXi4NQaYedEmxwMT5A6yn4wxJK0xc6J72NQrYBj-Cym0GJMyhpBuXXKTwbb9l2VT6u6vyccDF2pALdbUO5W8ne3qXVaaqDPOdpTgoFmSZZZxygCwTagnBTOBxQJYfFlxSMBzxFEjaFowEJPy9fMaKjEYx_H__Df-r9CK6HLdQydKiHMKl3jX2MPKzWT3rT-gG7oi_B
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+generic+integrity+verification+algorithm+of+version+files+for+cloud+deduplication+data+storage&rft.jtitle=EURASIP+Journal+on+Information+Security&rft.au=Xu%2C+Guangwei&rft.au=Lai%2C+Miaolin&rft.au=Li%2C+Jing&rft.au=Sun%2C+Li&rft.date=2018-09-20&rft.pub=Springer+Nature+B.V&rft.issn=1687-4161&rft.eissn=1687-417X&rft.volume=2018&rft.issue=1&rft.spage=1&rft.epage=15&rft_id=info:doi/10.1186%2Fs13635-018-0083-x&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2510-523X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2510-523X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2510-523X&client=summon