T. Nguyen, W. Shen, Zhou Lei, Weimin Xu, Wencong Yuan, Chenwei Song
{"title":"A probabilistic integrity checking approach for dynamic data in untrusted cloud storage","authors":"T. Nguyen, W. Shen, Zhou Lei, Weimin Xu, Wencong Yuan, Chenwei Song","doi":"10.1109/ICIS.2013.6607837","DOIUrl":null,"url":null,"abstract":"This paper proposes a simple approach for client to verify whether his/her data have been modified on the cloud storage server without downloading the data. In our approach, a number of bytes of each data block is collected to compose its metadata and stored in the cloud server along with small extra data. The approach effectively supports dynamic data operations with light overheads, in case of both computation and bandwidth. Our experiment shows that the computation time consumed is much less than the traditional MD5 checksum depending on different variable.","PeriodicalId":345020,"journal":{"name":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE/ACIS 12th International Conference on Computer and Information Science (ICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIS.2013.6607837","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper proposes a simple approach for client to verify whether his/her data have been modified on the cloud storage server without downloading the data. In our approach, a number of bytes of each data block is collected to compose its metadata and stored in the cloud server along with small extra data. The approach effectively supports dynamic data operations with light overheads, in case of both computation and bandwidth. Our experiment shows that the computation time consumed is much less than the traditional MD5 checksum depending on different variable.