Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Computer Standards &...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Computer Standards & Interfaces
Article . 2017 . Peer-reviewed
License: Elsevier TDM
Data sources: Crossref
DBLP
Article . 2023
Data sources: DBLP
versions View all 2 versions
addClaim

Provable data transfer from provable data possession and deletion in cloud storage

Authors: Liang Xue; Jianbing Ni; Yannan Li; Jian Shen 0001;

Provable data transfer from provable data possession and deletion in cloud storage

Abstract

With the rapid development of cloud storage, an increasing number of users prefer to store their data on the remote cloud to reduce the burden of maintaining the data by themselves. Since different cloud storage providers offer distinct quality of service, e.g., prices, access speed, security and reliability, outsourced data transfer becomes a fundamental requirement for users to change their cloud storage providers. Therefore, how to guarantee the correctness and availability of the cloud data when the data are being transferred from one semi-trusted cloud to another becomes a primary concern of data owners. To address this issue, we propose a provable data transfer protocol based on provable data possession and deletion for secure cloud storage in this paper. Specifically, the data owner can transfer the outsourced data from one cloud to another, without retrieving the entire data from the old cloud, and checking the data integrity in the new cloud and worrying about the deletion of the removed data in the old cloud, after the data are transferred. Our scheme achieves the desirable features of supporting both plaintexts and ciphertexts operations, which means that two clouds can generate the possession proof and deletion evidence on the cloud data, respectively, regardless the data are encrypted or not. We also develop a prototype implementation of the proposed protocol which demonstrates the efficiency and practicality of the proposal. HighlightsIdentify the flaws of a previous data transfer schemes.Propose a provable data transfer from provable data possession and deletion in cloud storage.Prove the security of the generic construction.Implementation shows that our protocol is efficient.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    45
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
45
Top 10%
Top 10%
Top 10%
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!