Journal of Information Security and Applications 39 (2018) 10–18
Contents lists available at ScienceDirect
Journal of Information Security and Applications
journal homepage: www.elsevier.com/locate/jisa
A dynamic integrity verification scheme of cloud storage data based
on lattice and Bloom filter
Yunxue Yan
a
, Lei Wu
a , b , ∗
, Ge Gao
a
, Hao Wang
a , b
, Wenyu Xu
a
a
School of Information Science & Engineering, Shandong Normal University, China
b
Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, China
a r t i c l e i n f o
Article history:
Keywords:
Lattice cryptography
SIS problems
Cloud storage system
Bloom filter
Quantum theory
a b s t r a c t
With the development of quantum computer, making the traditional cloud storage program data integrity
verification protocol is no longer safe anymore, so how to establish a safe and efficient, cost-effective
cloud storage system becomes the industry’s research hotspot. This paper makes improvements on the
basis of the previous schemes. On the cloud storage model, we focus on the protection of user data
privacy, and send the file and user signature to CSP and TPA respectively, so these methods will improve
the privacy of signature information. In the cloud storage data calculation, using of lattice and Bloom
filter methods, can not only resist the quantum computer attacks, but also based on the realization of
dynamic integrity, improving the utilization of cloud storage space ultimately.
©2018 Elsevier Ltd. All rights reserved.
1.
Introduction
In today’s society, information technology has changed people’s
traditional way of life, people’s dependence on information tech-
nology continues to increase in recent years. With the increase in
the amount of data explosion, cloud computing came into being,
greatly improving people’s work efficiency. Cloud storage is based
on the development of cloud computing. The birth and develop-
ment of Cloud storage services provide cloud users a lot of storage
space, but nevertheless, cloud storage still has some shortcomings,
such as data missing, data is tampered or deleted. So cloud storage
data security issues become a key step in improving cloud stor-
age services. With the development of quantum computers, it is
necessary to design a signature scheme that can resist quantum
computer attacks, because the difficult problems in the traditional
cryptography system can be solved in the polynomial time, so that
the security of various encryption schemes is threatened.
1.1. Research background of cloud storage integrity
The concept of cloud storage is based on the development and
expansion of cloud computing. As a data storage and management
as the core of the cloud computing system, cloud storage for the
cloud era of large data processing provides a new solution. To oc-
cupy the core position in cloud computing, cloud storage platform
∗
Corresponding author at: School of Information Science & Engineering, Shan-
dong Normal University, China.
E-mail address: wulei@sdnu.edu.cn (L. Wu).
construction is very important. In general, the cloud storage plat-
form [28] is divided into four layers (user access layer, applica-
tion interface layer, the basic management layer, storage layer), as
shown in Fig. 1 . Although cloud storage has been recognized by
everyone, but there are still some of the advantages and disadvan-
tages that we need attention [27] , as shown in Table 1 .
With the continuous development of information technology
and economic times, the arrival of digital society has become an
inevitable trend. The traditional way of storage is not able to meet
the current large amount of data clearly. Cloud storage came into
being. Cloud storage security includes confidentiality, integrity, un-
forgeability. The first proposed validation data integrity is based on
the integrity of RSA algorithm proposed by Ateniese et al. [5] , but
due to the large number of modulo exponents in RSA, so when we
need to modify the data calculation efficiency will be very low. So
it is not suitable for big data dynamic storage. Wang et al. [6] pro-
posed in the cloud computing security background of the public
verification method and dynamic storage, but it could not resist
the quantum computer attacks.
1.2. Research background of lattice signature
The rapid development of information technology has also
brought about increasingly serious security issues. With the rapid
development of computer technology and network technology,
people’s understanding of information security more and more
profound, the information security requirements of the property
is also increasing, from the initial confidentiality, to the present
integrity, certification, non-repudiation. As well as availability re-
https://doi.org/10.1016/j.jisa.2018.01.004
2214-2126/© 2018 Elsevier Ltd. All rights reserved.