New Data Storage Auditing Protocols

Xinpeng Zhang,Chunxiang Xu,Wei Sai,Ying Li,Tao Zhou
DOI: https://doi.org/10.2991/ictcs-14.2014.10
2014-01-01
Abstract:Cloud storage is a kind of cloud computing services that allows users to store their data in a remote cloud. Because of the loss of data control, data owners will concern that their data will be misused or unauthorized access by other users, in addition, they also worry their data may be lost in the clouds. Therefore, verify the authenticity of the data has become a key issue of data stored on the untrusted server.Shacham and Waters [17] give two Data storage audit protocols with full security proofs against arbitrary adversaries in the strongest secure model, but the server needs to give back a linear combination of the blocks that will leak audit data to the auditor. In order to improve the agreement of Shaham and waters, we use a hash function and blind technique to construct a public's privacy audit protocol.
What problem does this paper attempt to address?