earticle

논문검색

A Survey of Remote Data Integrity Checking: Techniques and Verification Structures

초록

영어

Cloud storage offers clients great convenience to relieve them from heavy burden of storage and management, so an increasing number of clients choose to outsource their data to remote cloud providers. However, for clients, this entails a sacrifice of actual control of these files. Remote servers may suffer from disk failure for uncertain reasons or even delete rarely accessed data to sell these storages to other clients. Therefore, there’s a great necessity for clients to make sure that their data are well stored in remote servers. Numbers of remote integrity checking (RIC) schemes are proposed to solve issues above, including following up work Provable Data Possession (PDP) and Proofs of Retrievability (PoR), which can be applied in cloud auditing. This paper presents state-of-the-art RIC schemes and makes a classification from the perspective of whether they support dynamic verifications, i.e., whether they can still be used to make verifications after clients modify, insert or delete files. In static verification schemes, we delve into the mechanisms and techniques used for integrity checking. For dynamic ones, we discuss the authentication structures that support dynamic operations. We also present several remarks to guide readers to a wide vision of data checking as conclusions and future work.

목차

Abstract
 1. Introduction
 2. Generic Verification Models
 3. Classical Static Schemes
  3.1. MAC-Based Schemes
  3.2. RSA-Based Schemes
  3.3. BLS-Based Homomorphic Methods
 4. Schemes Supporting Dynamic Updates
  4.1. Disguised/Special Blocks (Sentinels)
  4.2. Skip List Based Schemes
  4.3. Tree-Based Dynamic Schemes
  4.4. Index Hash Table Based Schemes
 5. Efficiency and Performance
 6. Discussion and Conclusions
 Acknowledgements
 References

저자정보

  • Yu Chen Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China
  • Feng Wang Naval Academy of Armament, Beijing, 100161, China
  • Liehuang Zhu Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China
  • Zijian Zhang Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.