2018 ◽  
Vol 11 (4) ◽  
pp. 685-698 ◽  
Author(s):  
Zhengwei Ren ◽  
Lina Wang ◽  
Qian Wang ◽  
Mingdi Xu

2018 ◽  
Vol 57 (3) ◽  
pp. 589-602 ◽  
Author(s):  
Jian Xu ◽  
Zhihao Jiang ◽  
Andi Wang ◽  
Chen Wang and Fucai Zhou

2015 ◽  
Vol 30 (1) ◽  
pp. 22-57 ◽  
Author(s):  
David Cash ◽  
Alptekin Küpçü ◽  
Daniel Wichs

2015 ◽  
Vol 7 (5) ◽  
pp. 611-621 ◽  
Author(s):  
Jian Xu ◽  
Fucai Zhou ◽  
Zhihao Jiang ◽  
Rui Xue

2020 ◽  
Vol 63 (8) ◽  
pp. 1216-1230 ◽  
Author(s):  
Wei Guo ◽  
Sujuan Qin ◽  
Jun Lu ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.


Sign in / Sign up

Export Citation Format

Share Document