2020
DOI: 10.1109/access.2020.3006278
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System

Abstract: In cloud storage scenarios, data security has received considerably more attention than before. To ensure the reliability and availability of outsourced data and improve disaster resilience and data recovery ability, important data files possessed by users must be stored on multiple cloud service providers (CSPs). However, we know that CSP is invariably not reliable. In this situation, to verify the integrity of replica files stored by users on multiple CSPs simultaneously, a new dynamic multiple-replica prova… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…The data integrity is provided by q-Strong Diffie Hellman (q-SDH) assumptions. A PDP is presented for dynamic multiple copies of data in cloud storage [23]. The vector dot products are utilized in PDP and the dynamic data structure is presented on the basis of Divided Address Version Mapping Table (DAVMT).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The data integrity is provided by q-Strong Diffie Hellman (q-SDH) assumptions. A PDP is presented for dynamic multiple copies of data in cloud storage [23]. The vector dot products are utilized in PDP and the dynamic data structure is presented on the basis of Divided Address Version Mapping Table (DAVMT).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The real-time scenario demands the cloud environment to be more realistic by providing support to dynamic operations that includes data insertion, updation and deletion [5][6][7][8][9][10][11]. However, most of the existing literature are based on static data and do not support dynamic operations.…”
Section: Introductionmentioning
confidence: 99%
“…To address the threat to users' personal data in cloud services, researchers already have solutions in several areas, such as data integrity auditing 2–5 to ensure that data has not been tampered with or deleted, verifiable databases scheme (VDB) 6,7 to determine whether CSP have executed commands correctly, provable data possession 8,9 to verify data integrity and so on, but less attention is paid to data deletion. When a data owner asks a CSP to delete outsourced data, it needs to be determined whether the CSP has executed the order in good faith.…”
Section: Introductionmentioning
confidence: 99%
“…Figures 3,4,5,and 6 show the update of MIHT after a series of update operations. Figure3shows that the user inserts a new data block b 9 at the end of the leaf node h 14 , first updates the hash value of the node, and performs the update operation UpdateHash(5), then execute…”
mentioning
confidence: 99%
“…In 2015, Esiner et al [31] utilized flexlist to design an optimized DPDP scheme, which was able to hand plenty of updates simultaneously, thus improving efficiency. Yuan et al [32] studied the integrity auditing for dynamic multi-replica data that was maintained by multiple cloud data centers, and they presented a solution to hand this problem. In their protocol, the modular exponentiation was replaced by the vector dot products, thus effectively saving computational resources.…”
Section: Introductionmentioning
confidence: 99%