2015
DOI: 10.1109/tr.2015.2423192
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems

Abstract: In the application of cloud storage, a user no longer possesses his files in his local depository. Thus, he is concerned about the security of the stored files. Data confidentiality and data robustness are the main security issues. For data confidentiality, the user can first encrypt files and then store the encrypted files in a cloud storage. For data robustness, there are two concerns: service failure, and service corruption. We are concerned about data robustness in cloud storage services. Lin and Tzeng pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 38 publications
0
11
0
Order By: Relevance
“…() But replication introduces high storage overhead since multiple copies of the data are stored at different storage servers. Data IV schemes for erasure code‐based cloud storage system are presented in Bowers et al and Shen et al() However, erasure code‐based storage systems suffer from high repair bandwidth because the original file distributed among different servers needs to be reconstructed in order to recover the fraction of the file stored in the corrupted server.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…() But replication introduces high storage overhead since multiple copies of the data are stored at different storage servers. Data IV schemes for erasure code‐based cloud storage system are presented in Bowers et al and Shen et al() However, erasure code‐based storage systems suffer from high repair bandwidth because the original file distributed among different servers needs to be reconstructed in order to recover the fraction of the file stored in the corrupted server.…”
Section: Related Workmentioning
confidence: 99%
“…Several auditing schemes have been proposed in the recent years for different types of cloud storage settings. () In these schemes, homomorphic authentication tags are outsourced along with the data blocks to check data integrity with reduced communication overhead. Because of the homomorphic property of the authentication tags, the tag computed on the aggregated data blocks will be equal to the aggregated tags.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptographic or algebraic based approached to design on-the-fly verification techniques of the received coded fragments is another line of research proposed and discussed by several papers, e.g., [6], [7], [8], [9], [10], [11], [12], [13], [14]. High computational costs for verification and remarkable communication overhead due to pre-distribution of verification information represent limitations of these approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the algorithm enters a loop (lines [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22] in which -at each iteration -uses the Decode method (Alg. 1) to check whether the decoding of the fragments contributed only by nodes in W gives rise to a polluted sector (line 10).…”
Section: Identification Algorithmmentioning
confidence: 99%
See 1 more Smart Citation