• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing


Abstract

Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
G. Xu, S. Li, M. Lai, Y. Gan, X. Feng, Q. Huang, L. Li and W. Li, "Verification Control Algorithm of Data Integrity Verification in Remote Data sharing," KSII Transactions on Internet and Information Systems, vol. 16, no. 2, pp. 565-586, 2022. DOI: 10.3837/tiis.2022.02.011.

[ACM Style]
Guangwei Xu, Shan Li, Miaolin Lai, Yanglan Gan, Xiangyang Feng, Qiubo Huang, Li Li, and Wei Li. 2022. Verification Control Algorithm of Data Integrity Verification in Remote Data sharing. KSII Transactions on Internet and Information Systems, 16, 2, (2022), 565-586. DOI: 10.3837/tiis.2022.02.011.

[BibTeX Style]
@article{tiis:25308, title="Verification Control Algorithm of Data Integrity Verification in Remote Data sharing", author="Guangwei Xu and Shan Li and Miaolin Lai and Yanglan Gan and Xiangyang Feng and Qiubo Huang and Li Li and Wei Li and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2022.02.011}, volume={16}, number={2}, year="2022", month={February}, pages={565-586}}