Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3444370.3444622acmotherconferencesArticle/Chapter ViewAbstractPublication PagesciatConference Proceedingsconference-collections
research-article

Proof of Retrievability for Image Data in Industrial Cloud Platform

Published: 04 January 2021 Publication History

Abstract

With the increasing popularity of cloud storage, a large number of consumers rent cloud storage services to store their own data. However, with the loss of direct control over data, the integrity and availability of outsourced data become a major concern of users. In order to ensure the reliability and integrity of data in cloud storage server, some scholars have proposed various data integrity auditing schemes.
However, most data integrity auditing schemes only focus on single data rather than image data, and only a few articles propose the proof of data retrievability. In order to overcome this difficulty, this paper proposes a scheme of the proof of data retrievability of image data based on industrial cloud. In this scheme, reversible watermarking algorithm is used to verify the integrity of image data, and information dispersion algorithm is used to realize the data retrievability. A large number of security and performance analysis shows that the proposed scheme is efficient and provably secure.

References

[1]
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D., 2007.Provable data possession at untrusted stores.In:Proceedings of the 14th ACM Conference on Computer and Communications Security.ACM, Scottsdale, Arizona, USA, PP. 598--609.
[2]
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G., 2008. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. ACM, Istanbul, Turkey, p. 9.
[3]
Azraoui, M., Elkhiyaoui, K., Molva, R., Onen, M., 2014. Stealthguard:proofs of retrievability with hidden watchdogs.In:Proceedings of European Symposium on Research in Computer Security.Spring, pp. 235--256.
[4]
Advances in Crypology ASIACRYP. Springer, Gold Coast, Australia, pp. 514--532. Brwers, K, D., JUELS, A., Opera, A., 2009. Hail:a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM Computer and Communications Security. ACM, Chicago, USA, pp. 187--198.
[5]
Curtmola, R., Khan, O., Burns, R., Ateniese, G., 2008. MR-PDP:multiple-replica provable data possession. In: Distributed Computing Systems-ICDCS 2008. IEEE, Beijing, China, pp. 411--420.
[6]
Dimakis, A.G., Godfrey, P.B., Wu Y., Wainwright, M,J., Ramchandran, K. 2010.Network coding for distributed storage systems. IEEE Trans. Inf. Theor. 56(9), 4539--4551.
[7]
Erway C, Kupccu A, Papamathou C, et al. Dynamic provable data possession [C]// Proceedings of the 16th ACM Conference on Computer and Communications Security (CSS 2009). New York, USA: ACM Press, 2009:213--222.
[8]
WANG Qian, WANG Cong, LI Jin, et al. Enabling public verifiability and data dynamic for storage security in cloud computing [C]// Proceedings of 14th European Symposium on Research in Computer Security (ESORICS 2009). Berlin, Germany: Spring-Verlag Press, 2009: 355--370.
[9]
Anmin Fu, Yuhan Li, Shui Yu, Gonggxuan Zhang.DIPOR:An IDA-based dynamic proof of retrievability scheme for cloud storage systems.
[10]
CHENBIN ZHAO, LI XU, et. al. Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage.

Index Terms

  1. Proof of Retrievability for Image Data in Industrial Cloud Platform

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CIAT 2020: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
    December 2020
    597 pages
    ISBN:9781450387828
    DOI:10.1145/3444370
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Sun Yat-Sen University
    • CARLETON UNIVERSITY: INSTITUTE FOR INTERDISCIPLINARY STUDIES
    • Beijing University of Posts and Telecommunications
    • Guangdong University of Technology: Guangdong University of Technology
    • Deakin University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 January 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. PDP
    2. POR
    3. Reversible watermarking algorithm

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CIAT 2020

    Acceptance Rates

    CIAT 2020 Paper Acceptance Rate 94 of 232 submissions, 41%;
    Overall Acceptance Rate 94 of 232 submissions, 41%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 26
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media