SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk

Author(s):  
Yong Cheng ◽  
Zhiying Wang ◽  
Jiangjiang Wu ◽  
Songzhu Mei ◽  
Jiangchun Ren ◽  
...  
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 90036-90044 ◽  
Author(s):  
Hongliang Zhu ◽  
Ying Yuan ◽  
Yuling Chen ◽  
Yaxing Zha ◽  
Wanying Xi ◽  
...  

2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772746
Author(s):  
Jinxia Wei ◽  
Xinxin Niu ◽  
Ru Zhang ◽  
Jianyi Liu ◽  
Yuangang Yao

Deduplication has been widely applied to save storage overhead in the cloud server. Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. The signatures of all data blocks are generated and sent to the cloud server. Once receiving the data blocks and signatures, the cloud server compares the received signatures with the stored signatures. If there is a signature that has the same value as some stored signature, the received signature and data block will not be stored by the cloud server. Otherwise, the cloud server stores all received signatures and data blocks. In fact, these operations bring a lot of computational costs. To solve this problem, we propose a data integrity verification scheme with deduplication. In this scheme, the deduplication is performed by the cloud users, which can avoid additional communicational and computational costs. The experiment evaluation indicates that our scheme is practical for real application scenario. We demonstrate that the proposed scheme satisfies signature unforgeability, and the malicious users cannot obtain any legitimate file from the cloud server in the form of deception.


Information ◽  
2020 ◽  
Vol 11 (9) ◽  
pp. 409
Author(s):  
Yuan Ping ◽  
Yu Zhan ◽  
Ke Lu ◽  
Baocang Wang

Although cloud storage provides convenient data outsourcing services, an untrusted cloud server frequently threatens the integrity and security of the outsourced data. Therefore, it is extremely urgent to design security schemes allowing the users to check the integrity of data with acceptable computational and communication overheads. In this paper, we first propose a public data integrity verification scheme based on the algebraic signature and elliptic curve cryptography. This scheme not only allows the third party authority deputize for users to verify the outsourced data integrity, but also resists malicious attacks such as replay attacks, replacing attack and forgery attacks. Data privacy is guaranteed by symmetric encryption. Furthermore, we construct a novel data structure named divide and conquer hash list, which can efficiently perform data updating operations, such as deletion, insertion, and modification. Compared with the relevant schemes in the literature, security analysis and performance evaluations show that the proposed scheme gains some advantages in integrity verification and dynamic updating.


Sign in / Sign up

Export Citation Format

Share Document