{"title":"基于概率检验的云环境下保护远程数据完整性免受欺骗攻击","authors":"T. Avudiappan, R. Priya","doi":"10.23883/ijrter.conf.20190304.030.tasbc","DOIUrl":null,"url":null,"abstract":"Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third party auditor. In existing system, they propose a remote data integrity checking protocol that supports data dynamics. This paper adapts existing protocol to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance. Keywords— Data Integrity, data dynamics, Public verifiability, Privacy.","PeriodicalId":143099,"journal":{"name":"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Preserving Remote Data Integrity from Spoofing Attack in Cloud Environment using Probabilistic Checking Method\",\"authors\":\"T. Avudiappan, R. Priya\",\"doi\":\"10.23883/ijrter.conf.20190304.030.tasbc\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third party auditor. In existing system, they propose a remote data integrity checking protocol that supports data dynamics. This paper adapts existing protocol to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance. Keywords— Data Integrity, data dynamics, Public verifiability, Privacy.\",\"PeriodicalId\":143099,\"journal\":{\"name\":\"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23883/ijrter.conf.20190304.030.tasbc\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23883/ijrter.conf.20190304.030.tasbc","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Preserving Remote Data Integrity from Spoofing Attack in Cloud Environment using Probabilistic Checking Method
Remote data integrity checking is a crucial technology in cloud computing. Recently many works focus on providing data dynamics and/or public verifiability to this type of protocols. Existing protocols can support both features with the help of a third party auditor. In existing system, they propose a remote data integrity checking protocol that supports data dynamics. This paper adapts existing protocol to support public verifiability. The proposed protocol supports public verifiability without help of a third party auditor. In addition, the proposed protocol does not leak any private information to third party verifiers. Through a formal analysis, we show the correctness and security of the protocol. After that, through theoretical analysis and experimental results, we demonstrate that the proposed protocol has a good performance. Keywords— Data Integrity, data dynamics, Public verifiability, Privacy.