Dynamic Audit Services For Outsourced Storages in Clouds
Dynamic Audit Services For Outsourced Storages in Clouds
Dynamic Audit Services For Outsourced Storages in Clouds
VOL. 6,
NO. 2,
APRIL-JUNE 2013
227
INTRODUCTION
. Y. Zhu and C.-J. Hu are with the School of Computer and Communication
Engineering, University of Science and Technology Beijing, 30 Xueyuan
Road, Haidian District, Beijing 100083, China.
E-mail: zhuyan@ustb.edu.cn, huchangjun@ies.ustb.edu.cn.
. G.-J. Ah and S.S. Yau are with the School of Computing, Informatics, and
Decision Systems Engineering, Arizona State University, 699 S. Mill
Avenue, Tempe, AZ 85281. E-mail: {gahn, yau}@asu.edu.
. H. Hu is with the Department of Computer and Information Sciences,
Delaware State University, Dover, DE 19901. E-mail: hhu@desu.edu.
. H.G. An is with Google Inc. E-mail: hogeun78@gmail.com.
Manuscript received 28 Jan. 2011; revised 6 July 2011; accepted 21 July 2011;
published online 18 Aug. 2011.
For information on obtaining reprints of this article, please send e-mail to:
tsc@computer.org, and reference IEEECS Log Number TSC-2011-01-0007.
Digital Object Identifier no. 10.1109/TSC.2011.51.
1939-1374/13/$31.00 2013 IEEE
1. Source: http://www.hhs.gov/ocr/privacy/.
Published by the IEEE Computer Society
228
VOL. 6,
NO. 2,
APRIL-JUNE 2013
TABLE 1
Comparison of POR/PDP Schemes for a File Consisting of n Blocks
229
230
VOL. 6,
NO. 2,
APRIL-JUNE 2013
TABLE 2
IHT with Random Values
231
Fig. 5. Workflow of audit system: (a) tag generation and users verification, (b) periodic sampling audit, and (c) dynamic data operations and audit.
232
VOL. 6,
NO. 2,
APRIL-JUNE 2013
Fig. 6. Proposed IPOR scheme for key generation, tag generation, and verification protocol.
233
R
i
i
j1 mi;j , where the initial
P
H1 sj1 mi;j and mi fmi;j g denotes the
value is Ri
ith data block. We show a simple example to describe the
change of IHT for different operations in Table 2, where an
empty record (i 0) is used to support the operations on
the first record. The Insert operation on the last record is
replaced with Append operation. It is easy to prove that
each i is unique in in our scheme.
Based on the construction of IHTs, we propose a simple
method to provide dynamic data modification as illustrated
in Fig. 8. All tags and the IHT should be renewed and
reorganized periodically to improve the performance.
Obviously, we can replace the sequent lists with dynamically
linked lists to improve the efficiency of updating the IHT.
SECURITY ANALYSIS
e0 ; h eg; h
eg; h
eg; h
Ps
j1 j j
e@
Ps
j1 j
Ps
j1 j j
1
i vi ; hA
i;vi 2Q
i;vi 2Q
0
e@
vi mi;j
1
2
i vi ; hA
i;vi 2Q
Ps
j j
j1 j j
eg; h
0
1
s
Y 2 v
Y
i
e@
i ; h A
euj j ; h
:
i;vi 2Q
j1
234
(which includes the verified data fmi g and their tags fi g) in
public verification process. To address this problem, we
introduce Zero-Knowledge property into our construction:
1.
2.
Theorem 1. Our IPOR scheme is a (computational) zeroknowledge PDP (called as ZKPOR) with respect to the
polynomial-time simulators.
Then, we turn attention to the audit security for dynamic
operations. It is easy to discover that the security of our
scheme against dynamic operations is built on collision
2
resistant of all hash values i H1 i , where 1
Ps
00
00
H F n , i1 i mod p and i 00 Bi kVi kR00i 2 . First,
in an IHT fi g and i 00 Bi kVi kR00i , there exists no
identical records i and j for all dynamic operations only if
Bi 6 Bj , Vi 6 Vj , or Ri 6 R0j for any indexes i; j 2 IN.
Furthermore, the secrets f1 ; . . . ; s g 2 ZZsp are also used to
avoid a collision of files that have the same file name. For
both mechanisms, we can prove the following theorem (see
Appendix B, available in the online supplemental material):
p
2
1
collisionTheorem 2. The hash values i is "; 2L2 p ln 1"
q
4
1
resistant in our scheme, even if a client generates 2p ln 1"
files
with the
NO. 2,
APRIL-JUNE 2013
VOL. 6,
3.
235
236
VOL. 6,
NO. 2,
APRIL-JUNE 2013
Fig. 10. Ratio of queried blocks under different detection probabilities and different number of disrupted blocks.
Fig. 11. Ratio of queried blocks in total file blocks under different audit
frequency for 10 disrupted blocks and 10,000 file blocks.
237
Fig. 12. Experiment results under different file size, sampling ratio, and sector number.
CONCLUSIONS
ACKNOWLEDGMENTS
The work of Yan Zhu and Chang J. Hu was supported by
the National Natural Science Foundation of China (Project
Nos. 61170264 and 10990011) and the National 973 Project
(No. 2013CB329606). The work of Gail-J. Ahn and Hongxin
Hu was partially supported by grants from the US National
Science Foundation (NSF-IIS-0900970 and NSF-CNS0831360) and Department of Energy (DE-SC0004308). The
work of Stephen S. Yau and Ho G. An was partially
supported by a grant from the US National Science
Foundation (NSF-CCF-0725340). An earlier version of this
paper, entitled Dynamic Audit Services for Integrity
Verification of Outsourced Storages in Clouds, appeared
in the Proceedings of the 26th Annual ACM Symposium on
Applied Computing (SAC), pp. 1550-156, 2011. The authors
thank Shimin Chen, a masters student at Peking University, for verifying the scheme by C++ Language.
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
REFERENCES
[1]
[2]
[19]
[20]
238
VOL. 6,
NO. 2,
APRIL-JUNE 2013