A generic integrity verification algorithm of version files for cloud deduplication data storage
Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to...
Saved in:
| Published in | EURASIP Journal on Information Security Vol. 2018; no. 1; pp. 1 - 15 |
|---|---|
| Main Authors | , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Cham
Springer International Publishing
20.09.2018
Springer Nature B.V SpringerOpen |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2510-523X 1687-4161 2510-523X 1687-417X |
| DOI | 10.1186/s13635-018-0083-x |
Cover
| Abstract | Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to safeguard these data integrity. However, the cloud deduplication storage only focuses on file/chunk level to store one copy of the same data hosted by different data owners, and is not concerned with the same part of different data, e.g., a series of version files. We propose an integrity verification algorithm of different version files. The algorithm establishes the generic storage model of different version control methods to improve the universality of data verification. Then, the methods of verification tags and proofs generating are improved based on the index pointers corresponding to the storage relationship in the version groups and chained keys. Finally, the random diffusion extraction based on the random data sampling in the version group is proposed to improve the verification efficiency. The results of theoretical and experimental analysis indicate that the algorithm can achieve fast and large-scale verification for different version data. |
|---|---|
| AbstractList | Abstract Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to safeguard these data integrity. However, the cloud deduplication storage only focuses on file/chunk level to store one copy of the same data hosted by different data owners, and is not concerned with the same part of different data, e.g., a series of version files. We propose an integrity verification algorithm of different version files. The algorithm establishes the generic storage model of different version control methods to improve the universality of data verification. Then, the methods of verification tags and proofs generating are improved based on the index pointers corresponding to the storage relationship in the version groups and chained keys. Finally, the random diffusion extraction based on the random data sampling in the version group is proposed to improve the verification efficiency. The results of theoretical and experimental analysis indicate that the algorithm can achieve fast and large-scale verification for different version data. Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This paradigm also introduces new security issues such as the potential threat of data lost or corrupted. Data integrity verification is utilized to safeguard these data integrity. However, the cloud deduplication storage only focuses on file/chunk level to store one copy of the same data hosted by different data owners, and is not concerned with the same part of different data, e.g., a series of version files. We propose an integrity verification algorithm of different version files. The algorithm establishes the generic storage model of different version control methods to improve the universality of data verification. Then, the methods of verification tags and proofs generating are improved based on the index pointers corresponding to the storage relationship in the version groups and chained keys. Finally, the random diffusion extraction based on the random data sampling in the version group is proposed to improve the verification efficiency. The results of theoretical and experimental analysis indicate that the algorithm can achieve fast and large-scale verification for different version data. |
| ArticleNumber | 12 |
| Author | Shi, Xiujin Li, Jing Sun, Li Lai, Miaolin Xu, Guangwei |
| Author_xml | – sequence: 1 givenname: Guangwei surname: Xu fullname: Xu, Guangwei email: dh.xuguangwei@gmail.com organization: School of Computer Science and Technology, Donghua University – sequence: 2 givenname: Miaolin surname: Lai fullname: Lai, Miaolin organization: School of Computer Science and Technology, Donghua University – sequence: 3 givenname: Jing surname: Li fullname: Li, Jing organization: School of Computer Science and Technology, Donghua University – sequence: 4 givenname: Li surname: Sun fullname: Sun, Li organization: School of Computer Science and Technology, Donghua University – sequence: 5 givenname: Xiujin surname: Shi fullname: Shi, Xiujin organization: School of Computer Science and Technology, Donghua University |
| BookMark | eNqNkEtv1TAQhS1UJErpD2BniXVgbMePLKuKR6VKbEBiZxw_gq_c-GI70Pvvm9uUh5BArDw-M9-x5zxFJ3OePULPCbwkRIlXlTDBeAdEdQCKdbeP0CnlBDpO2aeT3-on6LzWHQBQBWoAfoo-X-DJz75Ei-Pc_FRiO-Bv6z1Ea1rMMzZpyqv65QbncOzUoxhi8hWHXLBNeXHYebfs0w_EmWZwbbmYyT9Dj4NJ1Z8_nGfo45vXHy7fddfv315dXlx3tqe8dcIyHgLvrbHKDtyE0SgHEEbhKSVW0MEKxeRImR0FH2WvpAVJLQsAngwDO0NXm6_LZqf3Jd6YctDZRH0v5DJpU1q0yWs_SjkS54R0spdqGAVVKvQhEDVQqsLqRTevZd6bw3eT0k9DAvoYud4i12vk-hi5vl2hFxu0L_nr4mvTu7yUed1ZU0KACEk4WafINmVLrrX48F_O8g_GxnafdCsmpn-SD4vU9ZV58uXXn_4O3QHBNLU8 |
| CitedBy_id | crossref_primary_10_1155_2022_3242092 crossref_primary_10_1007_s11042_022_14104_3 |
| Cites_doi | 10.1109/TPDS.2012.66 10.1109/TIFS.2016.2631951 10.1504/IJHPCN.2016.076264 10.1023/A:1008354106356 10.1109/TIFS.2016.2549002 10.1007/BFb0054130 10.1109/TPDS.2012.278 10.1145/1315245.1315318 10.1145/1653662.1653688 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2018 EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: The Author(s) 2018 – notice: EURASIP Journal on Information Security is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | C6C AAYXX CITATION 3V. 7SC 7XB 8AL 8FD 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L7M L~C L~D M0N P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY DOA |
| DOI | 10.1186/s13635-018-0083-x |
| DatabaseName | Springer Nature Link OA Free Journals CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: C6C name: Springer Nature OA Free Journals url: http://www.springeropen.com/ sourceTypes: Publisher – sequence: 2 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 4 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 2510-523X 1687-417X |
| EndPage | 15 |
| ExternalDocumentID | oai_doaj_org_article_eb77b1dd67d74789b6288f4ff189228f 10.1186/s13635-018-0083-x 10_1186_s13635_018_0083_x |
| GrantInformation_xml | – fundername: Shanghai Education and Scientific Research Project grantid: C160076 |
| GroupedDBID | -A0 .4S .DC 2WC 3V. 4.4 40G 5VS 6KP 8FE 8FG 8R4 8R5 AAKPC ABUWG ACGFS ADBBV ADINQ ADMLS AFKRA AHBYD AHYZX ALMA_UNASSIGNED_HOLDINGS AMKLP ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ C24 C6C CCPQU CS3 DWQXO EDO EIS GNUQQ GROUPED_DOAJ HCIFZ HZ~ K6V K7- KQ8 M0N M~E OK1 P62 PQQKQ PROAC Q2X RHU SEG TR2 TUS U2A AAYXX CITATION OVT PUEGO 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D PHGZM PHGZT PKEHL PQEST PQGLB PQUKI PRINS Q9U 2VQ ADTOC C1A H13 IL9 O9- UNPAY |
| ID | FETCH-LOGICAL-c425t-6c35ff54cac8c95afba8d00fb6e221c629c6837b23cb65b7487c072c3f00e1993 |
| IEDL.DBID | BENPR |
| ISSN | 2510-523X 1687-4161 |
| IngestDate | Fri Oct 03 12:39:16 EDT 2025 Tue Aug 19 22:13:54 EDT 2025 Sat Oct 11 05:45:20 EDT 2025 Wed Oct 01 02:56:13 EDT 2025 Thu Apr 24 23:12:26 EDT 2025 Fri Feb 21 02:32:16 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Random diffusion extraction Version file storage Version group Data integrity verification |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c425t-6c35ff54cac8c95afba8d00fb6e221c629c6837b23cb65b7487c072c3f00e1993 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-018-0083-x |
| PQID | 2110167151 |
| PQPubID | 237294 |
| PageCount | 15 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_eb77b1dd67d74789b6288f4ff189228f unpaywall_primary_10_1186_s13635_018_0083_x proquest_journals_2110167151 crossref_primary_10_1186_s13635_018_0083_x crossref_citationtrail_10_1186_s13635_018_0083_x springer_journals_10_1186_s13635_018_0083_x |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2018-09-20 |
| PublicationDateYYYYMMDD | 2018-09-20 |
| PublicationDate_xml | – month: 09 year: 2018 text: 2018-09-20 day: 20 |
| PublicationDecade | 2010 |
| PublicationPlace | Cham |
| PublicationPlace_xml | – name: Cham – name: New York |
| PublicationTitle | EURASIP Journal on Information Security |
| PublicationTitleAbbrev | EURASIP J. on Info. Security |
| PublicationYear | 2018 |
| Publisher | Springer International Publishing Springer Nature B.V SpringerOpen |
| Publisher_xml | – name: Springer International Publishing – name: Springer Nature B.V – name: SpringerOpen |
| References | Jea, Feng, Yau, Chen, Dai (CR18) 1998 Ismail, Kiennert, Leneutre, Chen (CR11) 2016; 11 Deswarte, Quisquater, Saidane (CR5) 2003 Wang, Wang, Ren, Lou (CR2) 2010 Liu, Sun, Lou, Pei, Zhang (CR13) 2017 Xu, Yang, Yan, Gan (CR1) 2016; 10 Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song (CR3) 2007 Ateniese, Pietro, Mancini, Tsudik (CR6) 2008 Wang, Wang, Li, Ren, Lou (CR9) 2009 Yuan, Yu (CR16) 2013 Yang, Jia (CR10) 2013; 24 Xu (CR19) 2016; 9 Erway, Küpçü, Papamanthou, Tamassia (CR7) 2009 Grandi (CR17) 2013 Zhu, Hu, Ahn, Yu (CR23) 2012; 23 (CR25) 1998 Ghobadi, Mahdizadeh, Kee, Wei, Ghods (CR21) 2011 Wang, Wang, Ren, Lou (CR12) 2009 Hou, He, Zhao, Xie (CR20) 2010 Zhang, Xu, Liang, Li, Mu, Zhang (CR15) 2017; 12 Koblitz, Menezes, Vanstone (CR24) 2000; 19 TEZUKA, UDA, OKADA (CR22) 2012 Shacham, Waters (CR4) 2008 Juels, Kaliski (CR8) 2007 O’Sullivan (CR14) 2009 K. Yang (83_CR10) 2013; 24 G. Ateniese (83_CR6) 2008 S. TEZUKA (83_CR22) 2012 G. Xu (83_CR19) 2016; 9 C. Wang (83_CR12) 2009 C. Erway (83_CR7) 2009 F. Grandi (83_CR17) 2013 Z. Ismail (83_CR11) 2016; 11 A. Ghobadi (83_CR21) 2011 M. Bellare (83_CR25) 1998 K. Jea (83_CR18) 1998 N. Koblitz (83_CR24) 2000; 19 S. Hou (83_CR20) 2010 A. Juels (83_CR8) 2007 G. Ateniese (83_CR3) 2007 Q. Wang (83_CR9) 2009 X. Liu (83_CR13) 2017 Y. Zhang (83_CR15) 2017; 12 G. Xu (83_CR1) 2016; 10 C. Wang (83_CR2) 2010 J. Yuan (83_CR16) 2013 Y. Deswarte (83_CR5) 2003 Y. Zhu (83_CR23) 2012; 23 H. Shacham (83_CR4) 2008 B. O’Sullivan (83_CR14) 2009 |
| References_xml | – start-page: 1 year: 2009 end-page: 9 ident: CR12 article-title: Ensuring data storage securityin cloud computing publication-title: Proceedings of the 17th International Workshop on Quality of Service – volume: 23 start-page: 2231 issue: 12 year: 2012 end-page: 2244 ident: CR23 article-title: Cooperative provable data possession for integrity verification in multicloud storage publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2012.66 – start-page: 224 year: 2013 end-page: 232 ident: CR17 article-title: Dynamic multi-version ontology-based personalization publication-title: Proceedings of the Joint EDBT/ICDT Workshops – start-page: 136 year: 2010 end-page: 139 ident: CR20 article-title: Research on threshold-based version hybrid storage model publication-title: Proceedings of the 2nd International Conference on Industrial and Information Systems – year: 2017 ident: CR13 article-title: One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage publication-title: proceedings of IEEE INFOCOM 2017 – volume: 12 start-page: 676 issue: 3 year: 2017 end-page: 688 ident: CR15 article-title: Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation publication-title: IEEE Trans. Inf. Forensic Secur. doi: 10.1109/TIFS.2016.2631951 – volume: 9 start-page: 218 issue: 3 year: 2016 end-page: 229 ident: CR19 article-title: A probabilistic verification algorithm against spoofing attacks on remote data storage publication-title: Int. J. High Perform. Comput. Netw. doi: 10.1504/IJHPCN.2016.076264 – volume: 19 start-page: 173 issue: 2 year: 2000 end-page: 193 ident: CR24 article-title: The state of elliptic curve cryptography publication-title: Des. Codes Crypt. doi: 10.1023/A:1008354106356 – start-page: 1043 year: 2011 end-page: 1048 ident: CR21 article-title: Pre-processing directory structure for improved rsync transfer performance publication-title: Proceedings of the 2th International Conference on Advanced Communication Technology – volume: 11 start-page: 1685 issue: 8 year: 2016 end-page: 1699 ident: CR11 article-title: Auditing a cloud provider’s compliance with data backup requirements: a game theoretical analysis publication-title: IEEE Trans. Inf. Forensic Secur. doi: 10.1109/TIFS.2016.2549002 – year: 2009 ident: CR14 publication-title: Mercurial: the definitive guide – start-page: 584 year: 2007 end-page: 597 ident: CR8 article-title: Pors: proof of retrievability for large files publication-title: Proceedings of the 14th ACM conference on Computer and communications security(CCS’07) – start-page: 213 year: 2009 end-page: 222 ident: CR7 article-title: Dynamic provable data possession publication-title: Proceedings of the 16th ACM conference on Computer and communications security – start-page: 598 year: 2007 end-page: 609 ident: CR3 article-title: Provable data possession at untrusted stores publication-title: Proceedings of the 14th ACM conference on Computer and Communications Security – start-page: 23 year: 2012 end-page: 30 ident: CR22 article-title: Adec: assured deletion and verifiable version control for cloud storage publication-title: Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications – start-page: 145 year: 2013 end-page: 153 ident: CR16 article-title: Secure and constant cost public cloud storage auditing with deduplication publication-title: Proceedings of IEEE Conference on Communications and Network Security (CNS) – year: 2010 ident: CR2 article-title: Privacy-preserving public auditing for data storage security in cloud computing publication-title: proceedings of IEEE INFOCOM 2010 – start-page: 1 year: 2003 end-page: 11 ident: CR5 article-title: Remote integrity checking publication-title: Proceedings of IFIP Advances in Information and Communication Technology – start-page: 236 year: 1998 end-page: 250 ident: CR25 article-title: Fast batch verification for modular exponentiation and digital signatures publication-title: Proceedings of Advances in Cryptology-EUROCRYPT’98 doi: 10.1007/BFb0054130 – start-page: 369 year: 1998 end-page: 376 ident: CR18 article-title: A difference-based version model for oodbms publication-title: Proceedings of 1998 Asia Pacific Software Engineering Conference – volume: 10 start-page: 4703 issue: 10 year: 2016 end-page: 4723 ident: CR1 article-title: A rapid locating protocol of corrupted data for cloud data storage publication-title: Ksii Trans. Internet Inf. Syst. – start-page: 355 year: 2009 end-page: 370 ident: CR9 article-title: Enabling public verifiability and data dynamics for storage security in cloud computing publication-title: Proceedings of the 14th European Symposium on Research in Computer Security – volume: 24 start-page: 1717 issue: 9 year: 2013 end-page: 1726 ident: CR10 article-title: An efficient and secure dynamic aduiting protocol for data storage in cloud computing publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2012.278 – start-page: 90 year: 2008 end-page: 107 ident: CR4 article-title: Compact proofs of retrievability publication-title: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Securit – start-page: 1 year: 2008 end-page: 10 ident: CR6 article-title: Scalable and efficient provable data possession publication-title: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks – start-page: 598 volume-title: Proceedings of the 14th ACM conference on Computer and Communications Security year: 2007 ident: 83_CR3 doi: 10.1145/1315245.1315318 – start-page: 145 volume-title: Proceedings of IEEE Conference on Communications and Network Security (CNS) year: 2013 ident: 83_CR16 – start-page: 369 volume-title: Proceedings of 1998 Asia Pacific Software Engineering Conference year: 1998 ident: 83_CR18 – volume: 24 start-page: 1717 issue: 9 year: 2013 ident: 83_CR10 publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2012.278 – volume-title: proceedings of IEEE INFOCOM 2010 year: 2010 ident: 83_CR2 – volume-title: Mercurial: the definitive guide year: 2009 ident: 83_CR14 – start-page: 1 volume-title: Proceedings of IFIP Advances in Information and Communication Technology year: 2003 ident: 83_CR5 – start-page: 136 volume-title: Proceedings of the 2nd International Conference on Industrial and Information Systems year: 2010 ident: 83_CR20 – start-page: 355 volume-title: Proceedings of the 14th European Symposium on Research in Computer Security year: 2009 ident: 83_CR9 – volume-title: proceedings of IEEE INFOCOM 2017 year: 2017 ident: 83_CR13 – volume: 10 start-page: 4703 issue: 10 year: 2016 ident: 83_CR1 publication-title: Ksii Trans. Internet Inf. Syst. – start-page: 1043 volume-title: Proceedings of the 2th International Conference on Advanced Communication Technology year: 2011 ident: 83_CR21 – start-page: 1 volume-title: Proceedings of the 17th International Workshop on Quality of Service year: 2009 ident: 83_CR12 – start-page: 224 volume-title: Proceedings of the Joint EDBT/ICDT Workshops year: 2013 ident: 83_CR17 – start-page: 1 volume-title: Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks year: 2008 ident: 83_CR6 – start-page: 23 volume-title: Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications year: 2012 ident: 83_CR22 – start-page: 213 volume-title: Proceedings of the 16th ACM conference on Computer and communications security year: 2009 ident: 83_CR7 doi: 10.1145/1653662.1653688 – volume: 23 start-page: 2231 issue: 12 year: 2012 ident: 83_CR23 publication-title: IEEE Trans. Parallel Distrib. Syst. doi: 10.1109/TPDS.2012.66 – start-page: 584 volume-title: Proceedings of the 14th ACM conference on Computer and communications security(CCS’07) year: 2007 ident: 83_CR8 – start-page: 236 volume-title: Proceedings of Advances in Cryptology-EUROCRYPT’98 year: 1998 ident: 83_CR25 doi: 10.1007/BFb0054130 – start-page: 90 volume-title: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Securit year: 2008 ident: 83_CR4 – volume: 19 start-page: 173 issue: 2 year: 2000 ident: 83_CR24 publication-title: Des. Codes Crypt. doi: 10.1023/A:1008354106356 – volume: 11 start-page: 1685 issue: 8 year: 2016 ident: 83_CR11 publication-title: IEEE Trans. Inf. Forensic Secur. doi: 10.1109/TIFS.2016.2549002 – volume: 9 start-page: 218 issue: 3 year: 2016 ident: 83_CR19 publication-title: Int. J. High Perform. Comput. Netw. doi: 10.1504/IJHPCN.2016.076264 – volume: 12 start-page: 676 issue: 3 year: 2017 ident: 83_CR15 publication-title: IEEE Trans. Inf. Forensic Secur. doi: 10.1109/TIFS.2016.2631951 |
| SSID | ssj0002808905 ssj0064073 |
| Score | 2.1069794 |
| Snippet | Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s. This... Abstract Data owners’ outsourced data on cloud data storage servers by the deduplication technique can reduce not only their own storage cost but also cloud’s.... |
| SourceID | doaj unpaywall proquest crossref springer |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Algorithms Communications Engineering Control methods Data integrity Data integrity verification Data sampling Data storage Engineering Integrity Networks Random diffusion extraction Security Science and Technology Signal,Image and Speech Processing Systems and Data Security Version control Version file storage Version group |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT-QwDI4QF-CwPBa0AwPKgROoIk3bND0CYoSQ4AQSt5C4CQ91Z0Y7Mwv8e-y20x0ucNmrm1ZRPzu2Y-szY4cWMkhiryIVaIRZrouokNJHGorUCWU91MMmrm_U5V16dZ_dL4z6op6whh64-XEn3uW5i8tS5SVRvReO5uOGNIRY40d1oNNX6GIhmXqpr4xQJrpAmKpVSVvTjLU6mcQJOlpMo3VEMUj09skr1eT9nyLOrki6xlZmw7F9f7VVteCHBhvsRxtA8tNm45tsyQ-32Pp8OANvbfUnezjlj0Qp_Qy8oYTAcJuj3lJrUI0Gt9XjCKVPv_ko8L_NvRknnqYJx0iWQzWalbxEV9SVuDn1k3Lqp8RTaJvdDS5uzy-jdpxCBGiY00hBkoWQpWABkchscFaXQgSnvJQxKFmAwnTVyQScylyOqQyIXEIShPDU57fDloejof_FeOF0CT5Q9hPSWFoXcFGGAgQmS53rMTH_nQZarnEaeVGZOufQyjQIGETAEALmrceOulfGDdHGV4vPCKNuIXFk1wLUHNNqjvlOc3qsP0fYtIY7MZQPxyrHOKjHjueo_3v8xY6OO8X4fv-7_2P_e2xV1hpc4FHXZ8vTPzO_jxHS1B3UxvABfbAKuA priority: 102 providerName: Directory of Open Access Journals – databaseName: SpringerLink Journals (ICM) dbid: U2A link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT9wwELUqeqAc2kJbsUCRD5xAUR0ncZzjUhUhpPbUlbi59sTeIqUbxO4W-u8743wAUgXq1XESKzPjeeOZvGHsyEIBWepVogK1MCt1lVRS-kRDlTuhrIfYbOLrN3U-yy8ui8v-P-7lUO0-pCTjTh3NWqtPyzRD54ihr04INyQIHF8WxOaFSjyT0_FgRWqhKzFiYEpUZX0685-PeeSQIm__I7A55ke32OZ6cW3_3NqmeeCCzt6y1z125NNO2NvshV_ssDdDXwbem-kO23pAMviO_ZjyOXFLXwHvuCEQd3NUYKoRimLhtpm3OPrzF28D_90doHEibFpyhLQcmnZd8xp90pjr5lRYyqmwErej92x29uX75_Ok76uQAFroKlGQFSEUOVhAkRQ2OKtrIYJTXsoUlKxAYdzqZAZOFa7EmAZEKSELQngq-PvANhbtwu8yXjldgw8UBoU8ldYFnFTgQMjxBc5NmBg-roGedJx6XzQmBh9amU4eBuVhSB7mbsKOx1uuO8aNpyafksTGiUSWHQfam7npbc94V5YurWtV1tQtoHLUYhkXGFKNeqnDhB0M8ja9BS8NBcapKhEQTdjJoAP3l59Y0cmoJs-vf--_nr3PXsmouBVubgdsY3Wz9h8RE63cYbSBv_phA9I priority: 102 providerName: Springer Nature – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5V2wNwoDzFQkE-cKLKNk_HOS6IqkKi6oGVlpOxHXtZGjbLJuH165nJC4pQERJXx1Ec-5vxN_FkPoCnyiQmCiz3uCMJs1RkXhaG1hMmi7XPlTWt2MTrM366iF8tk-UenA__wnxYV55tdqpab_vJrGbDCSXpSbXOu94pc3G8zV1n84IfV0GEOyfGxcIjUuEhq9znCbLzCewvzs7nb0ljDuFHcdeyP9z8432Xtqe2iv8l6jmelt6Aa81mq759UUXxy4Z0cgCfhlfp8lAuZk2tZ-b7b1Ue_-e73oKbPXtl8w5ut2HPbu7AwaAMwXpHcRfezdmK6lmvDevqUSDXZ2g0lJfUQoGpYlVi6_uPrHTsc_fRjlGRqIohjWamKJuc5bgPjufrjJJZGSVzogu8B4uTl29enHq9loNn0CvUHjdR4lwSG2UQBolyWonc953mNgwDw8PMcIyVdRgZzROdYhxl_DQ0kfN9S0mG92GyKTf2AbBMi9xYR6GXi4NQaYedEmxwMT5A6yn4wxJK0xc6J72NQrYBj-Cym0GJMyhpBuXXKTwbb9l2VT6u6vyccDF2pALdbUO5W8ne3qXVaaqDPOdpTgoFmSZZZxygCwTagnBTOBxQJYfFlxSMBzxFEjaFowEJPy9fMaKjEYx_H__Df-r9CK6HLdQydKiHMKl3jX2MPKzWT3rT-gG7oi_B priority: 102 providerName: Unpaywall |
| Title | A generic integrity verification algorithm of version files for cloud deduplication data storage |
| URI | https://link.springer.com/article/10.1186/s13635-018-0083-x https://www.proquest.com/docview/2110167151 https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-018-0083-x https://doaj.org/article/eb77b1dd67d74789b6288f4ff189228f |
| UnpaywallVersion | publishedVersion |
| Volume | 2018 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064073 issn: 2510-523X databaseCode: KQ8 dateStart: 20070101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064073 issn: 2510-523X databaseCode: KQ8 dateStart: 20110101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: DOA dateStart: 20070101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0064073 issn: 2510-523X databaseCode: ADMLS dateStart: 20080101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: M~E dateStart: 20070101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064073 issn: 2510-523X databaseCode: BENPR dateStart: 20080101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064073 issn: 2510-523X databaseCode: 8FG dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: Springer Nature HAS Fully OA customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: AAJSJ dateStart: 20071201 isFulltext: true titleUrlDefault: https://www.springernature.com providerName: Springer Nature – providerCode: PRVAVX databaseName: Springer Nature OA Free Journals customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: C6C dateStart: 20071201 isFulltext: true titleUrlDefault: http://www.springeropen.com/ providerName: Springer Nature – providerCode: PRVAVX databaseName: Springer Open Access Hybrid - NESLI2 2011-2012 customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064073 issn: 2510-523X databaseCode: 40G dateStart: 20110101 isFulltext: true titleUrlDefault: http://link.springer.com/ providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002808905 issn: 2510-523X databaseCode: C24 dateStart: 20071201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 2510-523X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0064073 issn: 2510-523X databaseCode: U2A dateStart: 20111201 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3db9MwELe29gH2gECAKIzKDzwxRUucxHEeEMqqlakS1QRUGk_GduyCFJpubWH899w5H2Mv5eUeHEd27s6-O_vyO0LeKJOaOLI84A5LmGUiD3LGbCBMnuiQK2t8sYmPc36xSGZX6dUBmXf_wmBaZbcn-o26rA2ekZ9ioBLxDAzU-_V1gFWj8Ha1K6Gh2tIK5TsPMXZIhgyRsQZkeHY-v_yEUReH1YTefHu1GQl-uolisLcQTYsAXZHg9p5x8hj-9xzP_q70iDzYrdbqz29VVf-Yo-lj8qj1I2nRCP4JObCrp-RbQZcII_3D0AYGAlxsCrqK6UBeAlRVS_io7feftHb0V3NWRhGbaUPBe6WmqnclLcH89NfaFHNIKeZQws7zjCym518mF0FbQiEwsBi3ATdx6lyaGGWA-6lyWokyDJ3mlrHIcJYbDiGqZrHRPNUZhC8mzJiJXRhazO17TgaremVfEJprURrrMOJxScSUdtAphQaXwABaj0jY8U6aFl8cy1xU0scZgsuG3RLYLZHd8nZE3vavrBtwjX2dz1AgfUfExfYN9c1StstMWp1lOipLnpVYGCDXWE0ZJugiASoo3Igcd-KU7WLdyDvVGpGTTsR3j_fM6KTXgv_P_-X-oV-Rh8wrYg4b1zEZbG929jX4O1s9JodJ-AGomAIdFsXs82zcKja0TliClE_G_jwB6IIBHS7ml8XXv0pQBnM |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3dT9RAEJ8gPKAPRqPGU9R90BdJQ7ttt-0DMaCQQ-BiDCS8Lft5mNTryd0J_HP-bc70C3k5n3htt-1mZnZmfrvT-QG8VyY1ceREIDxRmGV5ERScuyA3RaJDoZypySaOR2J4mnw9S89W4E_3LwyVVXY-sXbUtjK0R75FQCUSGQaoT9NfAbFG0elqR6GhWmoFu123GGt_7Dh0N1cI4WbbB19Q3x843987-TwMWpaBwKC9zgNh4tT7NDHK4ART5bXKbRh6LRznkRG8MAJRnOax0SLVGWb4Jsy4iX0YOip_w_c-gLUkTgoEf2u7e6Nv3wnlCVy9hB7ao9QoF1uzKMb4jug9Dyj1Ca7vBMOaM-BOotufzT6C9cVkqm6uVFn-E_72n8DjNm9lO42hPYUVN3kG5ztsTG2rfxjWtJ3AlJ7h2qDyo1rjTJVjFOL84ierPPvd7M0x6gU1Y5gtM1NWC8sshrv-GJ1RzSqjmk30dM_h9F6E-QJWJ9XEvQRW6Nwa5wlh-STiSnsclOIFn-AHtB5A2MlOmrafOdFqlLLGNbmQjbgliluSuOX1AD72j0ybZh7LBu-SQvqB1Ie7vlBdjmW7rKXTWaYja0VmiYig0MTejBP0UY4mn_sBbHTqlK1zmMlbUx7AZqfi29tLZrTZW8H_5_9q-affwfrw5PhIHh2MDl_DQ14bZYFOcwNW55cL9wZzrbl-2xo0g_P7XkN_AcJIOx4 |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIgE9VCBAXdqCD3ChijZxEsc5INRSlpZCxYFKvbm2Yy9IYbN0d2n71_h1ncmr9LKcenWcxJr32OP5AF5rm9o4ciIQniDMMpkHOecukDZPTCi0szXYxNdjcXCSfD5NT1fgb3cXhsoqO5tYG-qisrRHPqREJRIZOqihb8sivu2P3k9_B4QgRSetHZxGIyJH7uoC07fZu8N95PUbzkcfv384CFqEgcCirM4DYePU-zSx2uLiUu2NlkUYeiMc55EVPLcCMzjDY2tEajKM7m2YcRv7MHRU-obfvQf3M-riTrfUR58ovxOot5Q3tIeokRTDWRSjZ8e8XQYU9ASXt9xgjRZwK8TtT2XX4OFiMtVXF7os_3F8o8ew3kasbLcRsSew4iZP4WyXjalh9U_LmoYTGMwz1AoqPKp5zXQ5RpLNf_xilWd_ml05Rl2gZgzjZGbLalGwAh1df4DOqFqVUbUm2rhncHInpHwOq5Nq4jaA5UYW1nnKrXwScW08TkpxwCf4A2MGEHa0U7btZE6AGqWqMxopVENuheRWRG51OYC3_SvTpo3Hssl7xJB-InXgrgeq87FqFVo5k2UmKgqRFQRBkBvCbcYF-kiisEs_gK2Onao1CzN1I8QD2OlYfPN4yYp2ein4__pfLP_1K3iAmqO-HB4fbcIjXstkjtZyC1bn5wu3jUHW3LyspZnB2V2rzzUitDi4 |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5V2wNwoDzFQkE-cKLKNk_HOS6IqkKi6oGVlpOxHXtZGjbLJuH165nJC4pQERJXx1Ec-5vxN_FkPoCnyiQmCiz3uCMJs1RkXhaG1hMmi7XPlTWt2MTrM366iF8tk-UenA__wnxYV55tdqpab_vJrGbDCSXpSbXOu94pc3G8zV1n84IfV0GEOyfGxcIjUuEhq9znCbLzCewvzs7nb0ljDuFHcdeyP9z8432Xtqe2iv8l6jmelt6Aa81mq759UUXxy4Z0cgCfhlfp8lAuZk2tZ-b7b1Ue_-e73oKbPXtl8w5ut2HPbu7AwaAMwXpHcRfezdmK6lmvDevqUSDXZ2g0lJfUQoGpYlVi6_uPrHTsc_fRjlGRqIohjWamKJuc5bgPjufrjJJZGSVzogu8B4uTl29enHq9loNn0CvUHjdR4lwSG2UQBolyWonc953mNgwDw8PMcIyVdRgZzROdYhxl_DQ0kfN9S0mG92GyKTf2AbBMi9xYR6GXi4NQaYedEmxwMT5A6yn4wxJK0xc6J72NQrYBj-Cym0GJMyhpBuXXKTwbb9l2VT6u6vyccDF2pALdbUO5W8ne3qXVaaqDPOdpTgoFmSZZZxygCwTagnBTOBxQJYfFlxSMBzxFEjaFowEJPy9fMaKjEYx_H__Df-r9CK6HLdQydKiHMKl3jX2MPKzWT3rT-gG7oi_B |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+generic+integrity+verification+algorithm+of+version+files+for+cloud+deduplication+data+storage&rft.jtitle=EURASIP+Journal+on+Information+Security&rft.au=Xu%2C+Guangwei&rft.au=Lai%2C+Miaolin&rft.au=Li%2C+Jing&rft.au=Sun%2C+Li&rft.date=2018-09-20&rft.pub=Springer+Nature+B.V&rft.issn=1687-4161&rft.eissn=1687-417X&rft.volume=2018&rft.issue=1&rft.spage=1&rft.epage=15&rft_id=info:doi/10.1186%2Fs13635-018-0083-x&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2510-523X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2510-523X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2510-523X&client=summon |