期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:11
DOI:10.15680/IJIRCCE.2015.0311174
出版社:S&S Publications
摘要:Protect outsider data stored in the cloud against fraud, adding fault tolerance to cloud storage togetherwith data accuracy and consistency checking and failure reformation becomes critical. Recently, regenerating codeshave gained popularity because of their lower repair bandwidth while working properly in case of failure. Existingremote checking methods for regenerating-coded data provide private auditing, it must require data owners to alwaysstay online and handle auditing and repairing also, which is sometimes impossible. In this paper, we propose a publicauditing scheme for the regenerating-code-based cloud storage. To solve the reconstruction problem of failedauthenticators when the data owner is not present, we introduce a proxy, which is authorized to reconstruct theauthenticators, into the traditional public auditing system model. Moreover, we design a innovative public verifiableauthenticator, which is generated by a couple of keys and can be reconstructed using limited keys. Thus, our schemecan thoroughly release data owners from staying online. In addition, we randomize the encode coefficients with apseudorandom function to preserve data privacy. Extensive security analysis shows that our scheme is proved secureunder random oracle model and also experimental evaluation shows that our scheme is highly efficient and can beconceivably integrated into the regenerating- code-based cloud storage.
关键词:Cloud storage; regenerating codes; public audit; privacy preserving; authenticator reconstruction;proxy; and authorized; provable secure