A Data Integrity Verification Scheme with Secure Deduplication in Smart Grid Cloud Storage
DOI: 10.23977/acss.2019.31001 | Downloads: 33 | Views: 3331
Author(s)
Shaomin Zhang 1, Kang Huang 1, Baoyi Wang 1
Affiliation(s)
1 Department of Control and Computer, North China Electric Power University, Huadian Road, Baoding, China
Corresponding Author
Shaomin ZhangABSTRACT
In order to solve the problem of data deduplication and data integrity in smart grid cloud storage, a data integrity verification scheme which can support security deduplication is proposed in the context of smart grid cloud storage. This scheme refers to an efficient and safe deduplication method based on the bloom filter, realizes the quick verification of the user's hash value and initialization value. In addition, the secure deduplication method is combined with S—PDP integrity verification mechanism, data segmentation and random sampling strategy, to realize the security deduplication and integrity verification of smart grid clients. By using erasure correction code, users can repair the damaged data. The analysis results show that this scheme can effectively reduce the computing cost and communication cost while ensuring that the cloud storage data of smart grid can be secure deduplicated and integrity verified.
KEYWORDS
Smart Grid, Cloud Storage, Secure Deduplication, Integrity Verification.CITE THIS PAPER
Shaomin, Z., Kang, H., Baoyi, W., A Data Integrity Verification Scheme with Secure Deduplication in Smart Grid Cloud Storage, Advances in Computer, Signals and Systems (2019) 3: 1-7. DOI: http://dx.doi.org/10.23977/acss.2019.31001.
REFERENCES
[1] Zheng Ling, Yao Jiangang, The Construction of Power Cloud Integrated with Heterogeneous Application Service Systems [C]//THE 2016 International Conference on Communications, Information Management and Network Security (CIMNS).Shanghai, CHINA,2016:345-348.
[2] HE Yao, Wang Wenqing, Xue Fei, Study of massive data mining based on cloud computing [J]. Automation of Electric Power Systems, vol.34, no.15, pp. 15-18, 2013.
[3] Wang Dewen, Song Yaqi, Zhu Yongli. Intelligent power grid information platform based on cloud computing [J]. Automation of Electric Power Systems, 2010, 34(22):7-12.
[4] Dutch M, Freeman L. Understanding Data Deduplication Ratio[EB/OL].[2018-07-08].http://www.snia.org/.
[5] Zhang Taoyi. Research on data integrity detection in cloud storage [D].ShenZhen University, 2016.
[6] Li Zhike. Research on data integrity verification and Deduplication technology in cloud storage [D]. Guangdong University of Technology, 2015.
[7] Zheng Qingji, Xu Shouhuai.Secure and Efficient Proof of Storage with Deduplication[C]//Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. San Antonio, USA: ACM Press, 2012: 1-12.
[8] Li Bin. Research on data integrity and deletion technology in cloud storage [D].Beijing University of Posts and Telecommunications, 2015.
[9] Zhang Lihong, Chen Jing, Du Ruiying, et al. Data Integrity Verification Method with Secure Deduplication in Cloud Storage [J]. Computer Engineering, 2017, 43(1):32-36, 42.
[10] Mao Zhen.Design and implementation of document ownership certificate protocol based on convergent encryption [D]. Xidian University, 2016.
[11] Liu Zhusong, Yang Zhangjie. Efficient and secure deduplication cloud storage scheme based on proof of ownership by Bloom filter[J]. Journal of Computer Applications, 2017,37(03):766-770.
[12] GONZALEZ-MAZANO L, ORFILA A. An efficient confidentiality-preserving proof of ownership for deduplication [J]. Journal of Network and Computer Applications, 2015, 50: 49 -59.
Downloads: | 13075 |
---|---|
Visits: | 255381 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks