With the popularity of cloud computing, cloud storage technology has also been widely used. Among them, data integrity verification is a hot research topic. At present, the realization of public auditing has become the development trend of integrity verification. Most existing public auditing schemes rarely consider some indispensable functions at the same time. Thus, in this article, we propose a comprehensive public auditing scheme (PDBPA) that can simultaneously support data privacy protection, data dynamics, and multi-user batch auditing. To guarantee privacy protection during the audit process, our PDBPA design a new method of constructing audit proof, which combines random masking techniques and bilinear properties of bilinear pairing. Not only can it ensure that TPA performs audits correctly, but it can also prevent it from exploring the user's sensitive data. In addition, by utilizing the modified dynamic hash table, which is a novel and small two-dimensional data structure, data dynamics can be effectively achieved. Furthermore, we provide a detailed process for the third-party auditors to perform batch audits for multiple users. Moreover, we give the detailed and rigorous security analysis in defending against forgery attack, replace attack, and replay attack. Performance evaluations demonstrate that our PDBPA scheme is effective and feasible.
K E Y W O R D Sbatch auditing, cloud computing, data dynamics, data privacy protection, public auditing, security cloud storage
INTRODUCTIONWith the advent of the information era, more and more people choose to outsource their data to cloud storage servers to save local storage space. Cloud server provider (CSP) supplies users with large-capacity, high-performance storage services, and users only need to determine service type according to own needs. However, because users have lost physical control of outsourced data, people have doubts about the security and integrity of data on the cloud. For example, untrustworthy CSP may deliberately discard data that users do not frequently access to save storage space; or lose user data due to their own mistakes but choose to conceal clients to maintain their reputation. Thus, it is a hard challenge whether the cloud storage system and its provider can meet the user's security requirements for data storage. To secure this, designing the data integrity checking scheme that can verify the integrity of outsourced data and resist malicious CSP has become a research hotspot for scholars.The traditional remote data integrity checking schemes require the user to download all the data blocks that have been uploaded to the CSP to the local, and then perform the verification, which is neither practical nor advisable. In fact, this is the method adopted by the private verification and has two gaps: (a) It will inevitably bring huge costs to the data owner (DO), especially when the DO possess the device with tight storage space