Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

@article{Yang2011ProvableDP,
  title={Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing},
  author={Jian Yang and Haihang Wang and J. J. Wang and Chengxiang Tan and Dingguo Yu},
  journal={J. Networks},
  year={2011},
  volume={6},
  pages={1033-1040}
}
Benefited from cloud storage services, users can save their cost of buying expensive storage and application servers, as well as deploying and maintaining applications. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored at cloud servers, which are the research issues the Provable Data Possession (PDP) faced. The most important features in PDP are: 1) supporting for public, unlimited numbers of times of… 
Secure Data Storage in Mobile Cloud Computing
TLDR
This paper explores the concept of Mobile Cloud Computing and issues associated with it, and proposed a possible solution to provide confidentiality, access control as well as integrity of data.
An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
TLDR
An Efficient Distributed Verification Protocol (EDVP) is proposed to verify the integrity of data in a distributed manner with support of multiple verifiers (Multiple TPAs) instead of single Verifier (TPA).
Enhancing Cloud Data Security and Integrity Using Third Party Auditing Service
Cloud Computing is called future generation architecture for computing. Generally cloud computing is a large scale and internet based computing paradigm in which pool of resources, shared software
Dynamic Data Possession Checking for Secure Cloud Storage Service
TLDR
A privacy-preserving data possession checking (DPC) scheme that allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data.
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment
TLDR
The experimental results show that the block-based sharing scheme consumes less energy, reduces the resources utilization, improves response time, and provides better security services to the mobile users in the presence of fully untrusted cloud server(s) as compared to the existing security schemes.
Survey Paper on Mobile Cloud Computing based Secure Data Management
Abstract Cloud computing offers efficient computing experience and computational resources. For utilizing the service of cloud no need to install and maintain the software’s and other resources in
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach
TLDR
The experimental results indicate that the proposed Cloud-Manager-based Re-encryption Scheme (CMReS) shows significant improvement in turnaround time, energy consumption, and resources utilization on the mobile device as compared to existing re-enc encryption schemes.
An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function
  • Preeti Garg, Vineet Sharma
  • Computer Science
    2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
  • 2014
TLDR
This paper proposed a mechanism which uses the concept of RSA algorithm, Hash function along with several cryptography tools to provide better security to the data stored on the mobile cloud to ensure the correctness of users' data in the cloud.
Adapting Efficient Software Requirement Engineering model to implement AES Algorithm for Mobile Cloud Computing
TLDR
The mobile user's private data and sensed information must be processed and stored in a secure manner in order to protect user's privacy in the cloud.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 22 REFERENCES
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
TLDR
The task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud is considered, and an elegant verification scheme is constructed for seamless integration of these two salient features in the protocol design.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
TLDR
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements.
Provable data possession at untrusted stores
TLDR
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data.
Towards Trusted Cloud Computing
TLDR
The design of a trusted cloud computing platform (TCCP) is proposed, which enables Infrastructure as a Service (IaaS) providers such as Amazon EC2 to provide a closed box execution environment that guarantees confidential execution of guest virtual machines.
Remote Integrity Check with Dishonest Storage Server
TLDR
The security of a proposed scheme HENC is proved and a notion, trap-door compression, that captures a property on compressibility is introduced, which brings out the question of whether there are fundamental differences between the two models.
Compact Proofs of Retrievability
TLDR
The first proof-of-retrievability schemes with full proofs of security against arbitrary adversaries in the strongest model, that of Juels and Kaliski, are given.
A Privacy Manager for Cloud Computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a
Improving Xen security through disaggregation
TLDR
This paper introduces the work to disaggregate the management virtual machine in a Xen-based system, and describes the implementation, which moves the domain builder, the most important privileged component, into a minimal trusted compartment.
Proofs of retrievability: theory and implementation
TLDR
This framework improves the previously proposed POR constructions of Juels-Kaliski and Shacham-Waters, and also sheds light on the conceptual limitations of previous theoretical models for PORs.
...
1
2
3
...