Share This Article:

Data Integrity Checking Protocol with Data Dynamics in Cloud Computing

Abstract Full-Text HTML XML Download Download as PDF (Size:303KB) PP. 274-282
DOI: 10.4236/ijcns.2017.105B027    700 Downloads   1,419 Views  

ABSTRACT

We introduce a model for provable data possession (PDP) which allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. In a previous work, Ateniese et al. proposed a remote data integrity checking protocol that supports data partial dynamics. In this paper, we present a new remote data possession checking protocol which allows an unlimited number of file integrity verifications and efficiently supports dynamic operations, such as data modification, deletion, insertion and append. The proposed protocol supports public verifiability. In addition, the proposed protocol does not leak any private information to third-party verifiers. Through a specific analysis, we show the correctness and security of the protocol. After that, we demonstrate the proposed protocol has a good performance.

1. Introduction

Recently, many works focus on providing remote data integrity checking protocols. Because storing data in the cloud has become a trend and an increasing number of clients store their important data in remote servers in the cloud, without leaving a copy in their local computers. Sometimes the data stored in the cloud is so important that the clients must ensure it is not lost or corrupted. Using a remote data integrity checking protocol, the client might be able to periodically verify that whether the data stored on the server side is complete. Any corruption will be noticed by the data owner who will be able to take immediate action.

Remote data integrity checking protocols have been proposed in the last few years and two recent results [1] Provable Data Possession (PDP) [2]-[14] and Proofs of Retrievability (POR) [15] have highlighted the importance of the problem and suggested two very different approaches. Ateniese et al. [2] first defined the notion of PDP, which allows a client to verify the integrity of its data stored at an un-trusted server without retrieving the entire file. Their scheme is designed for static data and used public key-based homomorphic tags for auditing the data file. Nevertheless, the pre-computation of the tags imposes heavy computation overhead that can be expensive for entire file. Subsequently, Ateniese et al. [3] constructed scalable and efficient schemes using symmetric keys in order to improve the efficiency of verification. This results in lower overhead than their previous scheme. The scheme partially supports dynamic data operations; however, it is not publicly verifiable and is limited in number of verification requests. Thereafter, several works were done following the models given in [2] [3]. Wang et al. [4] combined a BLS-based homomorphic authenticator with a Merkle hash tree to achieve a public auditing protocol with fully dynamic data. Recently, Mao Jian et al. [5] proposed the detection data of dynamic cloud using Merkle tree, the results show that this method is very effective. Erway et al. [6] proposed a fully dynamic PDP scheme based on rank-based authenticated dictionary. Unfortunately, their system is very inefficient. Hao Zhuo’s protocols [7] support data dynamics and public verifiability, but the calculation of this protocol and the number of blocks have a direct relationship, the amount of computation is still relatively large. After that Wei Xu et al. [8] proposed a remote storage integrity checking protocol based on homomorphic hash function, but the disadvantage of this protocol is losing feature of public verifiability. Zhu et al. [9] created a dynamic audit service based on fragment structure, random sampling and index-hash table that supports timely anomaly detection. Recently, Chun- ming Tang et al. [10] propose a new publicly verifiable method based on linearly homomorphic cryptography.

As a summary of the outstanding protocols: a protocol which satisfies the following requirements ought to be called a perfect protocol: [11] [12]

1) The amount of communication, Storage and computation required by the protocol should be low.

2) It ought to be possible to run the verification an unlimited number of times.

3) It supports dynamic operations include modification, deletion, insertion and append.

4) It supports privacy protection.

5) It supports public verifiability.

6) The changed data can be recovered.

7) It is suitable for large data integrity detection.

Current protocols can not meet all the above requirements. In this paper, the proposed protocol satisfies the above mentioned (1, 2, 3, 4, 5, 7). We have the following main contributions:

1) We propose a remote data integrity checking protocol for cloud storage, and the proposed protocol inherits the support of data dynamics from [3].

2) We give a security analysis of the proposed protocol which shows that it is secure against the un-trusted server

3) We have theoretically examined the performance and the results demonstrate that our protocol is efficient.

The rest of this paper is organized as follows: The new data possession checking protocol is described in Section2. Security analysis of the proposed protocol is presented in Section3. In section 4 we describe the support of data dynamics of the proposed protocol. Analysis of the proposed protocol is presented in Section5. Section 6 is a conclusion.

2. The New Data Integrity Checking Protocol

We consider a cloud storage system in which there is a client and an un-trusted server. The client stores her data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. If the server modifies any part of the client’s data, the client should be able to detect it; furthermore, any third-party verifier should also be able to detect it. In case a third-party verifier verifies the integrity of the client’s data, the data should be kept private against the third-party verifier.

In this scheme, we add the agreement stage between the client and the server, thus the use of probability select detection data reduces the computation both of the server and the verifier. The proposed protocol consists of five phases: Setup, Giggen, Agreement, Challenge and Verification.

Notice:

―cryptographic hash function. In practice, we use standard hash functions.

―pseudo-random function.

―the probability that can ensure the detection of the changed data blocks.

t―assume that the number of data blocks that have been changed.

―random number.

Setup: Firstly, given the security parameter k, client run the key generation algorithm and returns a pair of matching public key pk and the secret key sk. pk is public to everyone, while sk is kept secret by the client. Then, the client selects random number generation function and a authentication index r. The m denote the file that will be stored in the un-trusted server, which is divided into n blocks of equal lengths:

SigGen: The client computes the verification tag for each block: , , then using the secret key to encrypt the tag, represents a collection of all tags and sends to the server.

Agreement: The client sends the probability information of the data blocks to be detected to the verifier:. The verifier receives the information and then uses the public key of the client to decrypt information and calculate to be detected for a data block c after decryption, then sends to the client. The client received the message and decried it, so he can ensure that the verifier had received the message from him.

Challenge: The verifier selects c data blocks to be detected, and at the same time, the random challenge nonce is calculated for each data block. Then the verifier sends to the server.

Verification: Having received the message from verifier, server computes and

The server then retrieves and returns to verifier who, in turn, decrypt where, then compute and. The verifier checks whether. If the check succeeds, the function outputs “success”, otherwise the function outputs “failure”.

The following is the protocol flow Chart 1.

3. Security Analysis

Security means that the protocol is secure against the un-trusted server and is private against third-party verifiers. Client should not be able to pass verification unless it has access to complete unaltered version of m. Firstly, we think the remote server is not trusted; he can intentionally or unintentionally change the client’s data.

Lemma 1. This probability is negligible for a secure hash function, the attacker X is able to successfully find m' which with known file m has a function of the same value and is different from m:

Chart 1. Protocol flow chart.

Theorem 1. The proposed protocol uses secure hash functions, and secure private key encryption scheme, according to the lemma 1, it is known that the attacker X can tamper with the data and the probability of success is negligible.

Proof. Assume that the un-trusted server has taken the tampering with in the query results, then he computes, , according to the above lemma. So it is the same as by the nature of the hash function. Therefore, the attacker can tamper with the data and the probability of success is negligible.

It is important to note that in the verification phase of the verifier decrypts, the probability of obtaining the message is negligible, thus this protocol support third-party security verification

Then for the security of the agreement phase, the message is sent through the private key signature and the probability of the adversary’s forgery signature is very small. Furthermore the message does not involve secret information. Agreement stage is only to ensure that the certification is received by the main body of the test will, so as to carry out data integrity testing.

4. Data Dynamics

Now we show how our scheme explicitly and efficiently handle fully dynamic data operations including data modification (M), data insertion (I), data deletion (D) and data append (A) for cloud data storage. Note that in the following descriptions for the protocol design of dynamic operation, we assume that the file and the signature have already been generated and properly stored at server. The update operation is illustrated in Algorithm 1.

4.1. Data Modification

We start from data modification, which is one of the most frequently used operations in cloud data storage. A basic data modification operation refers to the replacement of specified blocks with new ones.

Suppose the client wants to modify the i-th block to, first the client generates the corresponding signature.Step completely in accordance with the above update algorithm, the update request message here is “” and sends it to the server, where M denotes the modification operation.

Upon receiving the request, the server runs

. Specifically, the server replaces the block with and with, then computes. Finally, the server responses the client with a proof for this operation. After receiving the proof for modification operation from server, the client first decrypts, then checks whether

. If it is not true, output FALSE, otherwise output TRUE.

4.2. Data Insertion

Data is inserted into the existing block in the operation are exactly the same with data modification. For the insertion of a single data block, this paper considers that the data files in a data block can be assigned to one or more existing data blocks and also can perform data modification operations.

4.3. Data Deletion

Data deletion is just the opposite operation of data insertion. Suppose the server receives the update request for deleting block mi, it will replace the block mi with DBlock, which DBlock is a fixed special block that represents deleted blocks. The details of the protocol procedures are similar to that of data modification and insertion, which are thus omitted here.

4.4. Data Append

Compared to data modification, data append does not change steps. The difference of additional data and data update is that you need to add new data blocks we call it where, so the corresponding update request message is “”, where A denotes the modification operation. Then the verification process behind the validation process and the data modification operation is exactly the same, so here it is no longer duplicated.

5. Analysis of the Proposed Protocol

Our scheme is based entirely on un-symmetric key cryptography. In this section we list the features of our proposed scheme and make a comparison of our scheme and state-of-the-art. It is worth noting that we denote pseudo random number generation and addition in the corresponding fields as prng and add.

5.1. Computational Cost

Server side. During verification, the server computes c hash integers. Then, it computes the value. The computation of each corresponds to the product of two integers being t and h bits long. So we obtain the upper bound on the server’s computation time:

Verifier side. Except for additional pseudorandom num-ber generations corresponding to the challenge, the cost analysis of computing is similar to that on the client side. Therefore, the verifier computation time is upper bounded by

The computation cost for server and verifier, though slightly higher, is still very reasonable. This does not include the time for the verifier of the data blocks to be detected, since the computation of the c requires only a very small mathematical calculation.

5.2. Storage Cost

Notice that each token is the output of a cryptographic hash function, so its size is small.

Server side. In line with the purpose of the protocol, the server has to store the complete data m and, whose bitlength is bits

Verifier side. The storage requirements for the verifier are only a pk, which was used in the verification phase.

5.3. Communication Cost

The communication cost consists of the challenge sent by the verifier to the server, with constant bitlength bits, and the response sent by the server to the verifier, with constant bitlength bits. It is critical to notice that the communication consumption which is ignored here in the agreement phase is very small.

5.4. Comparison with Selected Previous Protocols

We now compare our scheme with some existing schemes in terms of communication cost, computation cost on ser- ver side, computation cost on verifier side and storage cost on verifier side. For simplicity, here we denote them as Comm.cost, Comp.cost(S), Comp.cost(V), Storage.cost(V), respectively. Data dynamics and public verifiability are also listed in the table. Table 1 indicates that the proposed protocol is really minimal overhead. You should note that n denotes all the blocks.

6. Conclusion

In this paper, we propose a new remote data integrity checking protocol for cloud storage. We extend the PDP model [3] by changing the generation method of the signature. The proposed protocol supports data level dynamics and public verifiability. Meanwhile, it is desirable to minimize the file block accesses, the

Table 1. Comparisons between the proposed protocol and previous protocols.

computation on the server and the client-server communication. We expect that the salient features of our scheme make it attractive for realistic applications.

Acknowledgements

This work was supported by the Natural Science Foundation of China (61163001).

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Feng, J. and Long, S. (2017) Data Integrity Checking Protocol with Data Dynamics in Cloud Computing. International Journal of Communications, Network and System Sciences, 10, 274-282. doi: 10.4236/ijcns.2017.105B027.

References

[1] Tan, S., Jia, Y. and Han, W.H. (2015) Research and Development of Provable Data Integrity in Cloud Storage. Chinese Journal of Computers, 38, 164-177.
[2] Ateniese, G., Bruns, R. and Curtmola, R. (2007) Provable Data Possession at Untrusted Stores. Pro-ceedings of the 14th ACM Conference on Computer and Communications Security, Alexandra, 598-609. https://doi.org/10.1145/1315245.1315318
[3] Ateniese, G., Pietro, R.D., Mancini, L. and Tsudik, G. (2008) Scalable and Efficient Provable Data Possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, 1-10. https://doi.org/10.1145/1460877.1460889
[4] Wang, Q., Wang, C., Li, J. and Lou, W.J. (2009) Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. Proceedings of the 4th European Symposium on Research in Computer Security, Saint Malo, 355-370. https://doi.org/10.1007/978-3-642-04444-1_22
[5] Mao, J., Zhang, Y., Li, P., Wu, Q.H. and Liu, J.W. (2015) A Position-Aware Merkle Tree for Dynamic Cloud Data Integrity Verification. Soft Computing. https://doi.org/10.1007/s00500-015-1918-8
[6] Erway, C., Kupcu, A., Papamathou, C. and Tamassia, R. (2009) Dynamic Provable Data Possession. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 213-222. http://doi.org/10.1145/1653662.1653688
[7] Hao, Z., Zhong, S. and Yu, N.H. (2011) A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. IEEE Transactions on Knowledge and Data Engineering, 23, 1432-1437. https://doi.org/10.1145/1653662.1653688
[8] Xu, W., Feng, D. and Liu, J.N. (2012) Remote Data Integrity Checking Protocols from Homomorphic Hash Functions. Proceedings of 2012 IEEE 14th International Conference on Communication Technology, Chengdu, 604-608 https://doi.org/10.1109/TKDE.2011.62
[9] Zhu, Y., Ahn, G.-J., Hu, H.X., Yau, S.S., An, H.G. and Hu, C.-J. (2013) Dynamic Audit Services for Outsourced Storages in Clouds. IEEE TSC, 6, 227-238. https://doi.org/10.1109/ICCT.2012.6511277
[10] Tang, C.-M. and Zhang, X.J. (2015) A New Publicly Verifiable Data Possession on Remote Storage. Journal of Supercomputing, 1-15. https://doi.org/10.1007/s11227-015-1556-z
[11] Hu, D.M. and Yu, X. (2014) Dynamic Cloud Storage Data Integrity Verifying Me-thod Based on Homomorphic Tags. Application Research of Computers, 31, 1362-1395. https://doi.org/10.1007/s11227-015-1556-z
[12] Hu, D.M. and Yu, X. (2014) Dynamic Data Integrity Detection Method in Cloud Storage Service. Application Research of Computers, 31, 3056-3060.
[13] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z. and Song, D. (2011) Remote Data Checking Using Provable Data Possession. ACM Transactions on Information and System Security, 14, 1-34. https://doi.org/10.1145/1952982.1952994
[14] Li, A.P., Tan, S. and Jia, Y. (2016) A Method for Achieving Provable Data Integrity in Cloud Computing. Journal of Supercomputing, 1-17. https://doi.org/10.1145/1952982.1952994
[15] Juels, A. and Kaliski, B.S. (2007) PORs: Proofs of Retrievability for Large Files. Proceedings of the 14th ACM Conference on Computer and Communications Security, Whistler, 584-597. https://doi.org/10.1145/1315245.1315317

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.