Skip to main content

A Public Auditing Scheme with Data Recovery

  • Conference paper
  • First Online:
Genetic and Evolutionary Computing (ICGEC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 834))

Included in the following conference series:

  • 788 Accesses

Abstract

In order to solve the integrity verification of outsourced file in cloud, we based on the concept of regenerating code (RC) to propose a new public auditing scheme with data recovery in this paper. With the advantage of RC, our scheme provides a (kn) recovery functionality, i.e., only encoded data blocks from any k cloud servers, user can recover the original data files, where n denotes the total number of cloud servers and \(k\le n\).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)

    Google Scholar 

  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 12 (2011)

    Article  Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)

    Google Scholar 

  4. Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539–4551 (2010)

    Article  Google Scholar 

  5. Kim, D., Kwon, H., Hahn, C., Hur, J.: Privacy-preserving public auditing for educational multimedia data in cloud computing. Multimed. Tools Appl. 75(21), 13077–13091 (2016)

    Article  Google Scholar 

  6. Mell, P., Grance, T., et al.: The NIST definition of cloud computing (2011)

    Google Scholar 

  7. Wan, C., Zhang, J., Pei, B., Chen, C.: Efficient privacy-preserving third-party auditing for ambient intelligence systems. J. Ambient Intell. Humaniz. Comput. 7(1), 21–27 (2016)

    Article  Google Scholar 

  8. Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 2, 328–340 (2015)

    Article  Google Scholar 

  9. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  10. Wang, H., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based remote data possession checking in public clouds. IET Inf. Secur. 8(2), 114–121 (2014)

    Article  Google Scholar 

  11. Wu, T.Y., Tseng, Y.M.: An ID-based mutual authentication and key exchange protocol for low-power mobile devices. Comput. J. 53(7), 1062–1070 (2010)

    Article  Google Scholar 

  12. Wu, T.Y., Tseng, Y.M.: A pairing-based publicly verifiable secret sharing scheme. J. Syst. Sci. Complex. 24(1), 186–194 (2011)

    Article  MathSciNet  Google Scholar 

  13. Wu, T.Y., Tseng, Y.M.: Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Inf. Secur. 7(3), 239–246 (2013)

    Article  Google Scholar 

  14. Wu, T.Y., Tseng, Y.M., Tsai, T.T.: A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants. Comput. Netw. 56(12), 2994–3006 (2012)

    Article  Google Scholar 

  15. Wu, T.Y., Tsai, T.T., Tseng, Y.M.: Efficient searchable id-based encryption with a designated server. Ann. Telecommun.-Ann. Télécommun. 69(7–8), 391–402 (2014)

    Article  Google Scholar 

  16. Wu, T.Y., Lin, Y., Wang, K.H., Chen, C.M., Pan, J.S., Wu, M.E.: Comments on a privacy preserving public auditing mechanism for shared cloud data. In: Proceedings of the 4th Multidisciplinary International Social Networks Conference, p. 48. ACM (2017)

    Google Scholar 

  17. Wu, T.Y., Lin, Y., Wang, K.H., Chen, C.M., Pan, J.S.: Comments on Yu et al’s shared data integrity verification protocol. In: The Euro-China Conference on Intelligent Data Analysis and Applications, pp. 73–78. Springer (2017)

    Google Scholar 

  18. Wu, L., Wang, J., Kumar, N., He, D.: Secure public data auditing scheme for cloud storage in smart city. Pers. Ubiquitous Comput. 21(5), 949–962 (2017)

    Article  Google Scholar 

  19. Wu, T.Y., Chen, C.M., Wang, K.H., Pan, J.S., Zheng, W., Chu, S.C., Roddick, J.F.: Security analysis of rhee et al.’s public encryption with keyword search schemes: a review. J. Netw. Intell. 3(1), 16–25 (2018)

    Google Scholar 

  20. Xu, Z., Wu, L., Khan, M.K., Choo, K.K.R., He, D.: A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J. Supercomput. 73(12), 5285–5309 (2017)

    Article  Google Scholar 

  21. Zhang, J., Dong, Q.: Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)

    MathSciNet  Google Scholar 

  22. Zhang, J., Zhao, X.: Efficient chameleon hashing-based privacy-preserving auditing in cloud storage. Clust. Comput. 19(1), 47–56 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The work of Tsu-Yang Wu was supported in part by the Science and Technology Development Center, Ministry of Education, China under Grant no. 2017A13025 and the Natural Science Foundation of Fujian Province under Grant no. 2018J01636. The work of Chien-Ming was supported in part by Shenzhen Technical Project (JCYJ20170307151750788) and in part by Shenzhen Technical Project (KQJSCX20170327161755).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Ming Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, TY., Chen, CM., Wang, KH., Wu, J.MT., Pan, JS. (2019). A Public Auditing Scheme with Data Recovery. In: Pan, JS., Lin, JW., Sui, B., Tseng, SP. (eds) Genetic and Evolutionary Computing. ICGEC 2018. Advances in Intelligent Systems and Computing, vol 834. Springer, Singapore. https://doi.org/10.1007/978-981-13-5841-8_62

Download citation

Publish with us

Policies and ethics