Abstract

Aimed at the huge number of files in cloud storage and the low audit efficiency of single-node audit mode, this paper proposes a multi-agent-based cloud storage multi-copy data integrity check scheme. The scheme uses a bilinear mapping method to construct the key generation process and a multi-branch authentication tree to perform multi-copy data signature to implement multi-copy authentication, signature, and verification. It also uses a directed acyclic graph (DAG) to represent the task relationship in the workflow, task and resource allocation based on QoS demand preference settings to schedule multiple tasks. Experimental results show that the proposed scheme has obvious advantages over existing schemes in terms of communication, storage overhead, and audit efficiency, with an average audit efficiency improvement of 20%.

Highlights

  • With the increasing development of cloud computing technology, public cloud storage services have been widely used, and the number of users of public cloud storage products such as DropBox, Google Drive, Kingsoft Express and so on has grown rapidly [1], [2]

  • The Provable Data Possession (PDP) [3], [4] is an important method for verifying the integrity of data stored in the cloud

  • According to the relationship between the tasks in the directed acyclic graph (DAG) graph, firs prioritize the tasks and calculate the key factors of the tasks according to the formula to form the priority scheduling queue, and assign the tasks to the optimal resources according to the QoS demand settings

Read more

Summary

INTRODUCTION

With the increasing development of cloud computing technology, public cloud storage services have been widely used, and the number of users of public cloud storage products such as DropBox, Google Drive, Kingsoft Express and so on has grown rapidly [1], [2]. According to the constructed multi-copy and multibranch authentication tree, retrieve and calculate the node value and the root node value of the challenge data block; Second, generate the challenge request information and send it to the replica storage server. The specific process is as follows: (1) After receiving the challenge message chal, the CSP primary storage server queries the leaf nodes of the corresponding data block of chal = {(i, vi)}s1≤i≤se according to the constructed multi-copy and multi-branch authentication tree, records the authentication auxiliary information { i}s1≤i≤se of these leaf nodes, and calculates the corresponding first replica data node value R1 and root node value R 0 in the challenge information. (3) The k-th copy storage server calculates the corresponding node value Rk and the holding evidence μk and δk of the challenge data block according to the challenge request message chalk = {(k, i, vi)}.

DATA VERIFICATION
AUDIT PLAN GENERATION
BSTD ALGORITHM SCHEDULING PROCESS
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call