INTRODUCTION
Storing data in the cloud has become a
trend. An increasing number of clients store their important data n Remote
servers in the cloud, without leaving a copy in their local computers.
Sometimes the data stored in the cloud is so important that the clients must
ensure it is not lost or corrupted. While it is easy to check data integrity
after completely downloading the data to be checked, downloading large amounts
of data just for checking data integrity is a waste of communication bandwidth.
Hence, a lot of works have been done on designing remote data integrity
checking protocols, which allow data integrity to be checked without completely
downloading the data. Remote data integrity checking is first introduced in
which independently propose RSA-based methods for solving this problem. Propose
a remote storage auditing method based on pre-computed challenge-response
pairs. Recently many works focus on providing three advanced features for
remote data integrity checking protocols: data dynamics public verifiability
and privacy against verifiers the protocols is support data dynamics
at the block level, including block insertion, block modification and block
deletion. The protocol of supports data appends operation. In addition, can be
easily adapted to support data dynamics can be adapted to support data dynamics
by using the techniques of. On the other hand, protocols in support public
verifiability, by which anyone (not just the client) can perform the
integrity checking operation.
The protocols support privacy against third
party verifiers. We compare the proposed protocol with selected previous
protocols. (See Table I.) In this paper, we have the following main
contributions:• We propose a remote data integrity
checking protocol for cloud storage, which can be viewed as an adaptation of
Seb´e et al.’s protocol
The proposed protocol inherits the support of data dynamics from and
supports public verifiability and privacy against third party verifiers, while
at the same time it doesn’t need to use a third-party auditor. • We give a security analysis of the proposed protocol, which
shows that it is secure against the untrusted server and private against third
party verifiers.• We have theoretically analyzed and
experimentally tested the efficiency of the protocol. Both theoretical and
experimental results demonstrate that our protocol is efficient. The rest of
this paper is organized as follows. In Section II, technical preliminaries are
presented. In Section, the proposed remote data integrity checking protocol is
presented. In Section IV, a formal analysis of the proposed protocol is
presented. In Section V, we describe the support of data dynamics of the
proposed protocol. In Section VI, the protocol’s complexity is analyzed in the
aspects of communication, computation and storage costs; furthermore,
experimental results are presented for the efficiency of the protocol. And
finally, conclusions and possible future work are presented in Section