JOURNAL ARTICLE

Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing

Abstract

Benefited from cloud storage services, users can save their cost of buying expensive storage and application servers, as well as deploying and maintaining applications. Meanwhile they lost the physical control of their data. So effective methods are needed to verify the correctness of the data stored at cloud servers, which are the research issues the Provable Data Possession (PDP) faced. The most important features in PDP are: 1) supporting for public, unlimited numbers of times of verification; 2) supporting for dynamic data update; 3) efficiency of storage space and computing. In mobile cloud computing, mobile end-users also need the PDP service. However, the computing workloads and storage burden of client in existing PDP schemes are too heavy to be directly used by the resource-constrained mobile devices. To solve this problem, with the integration of the trusted computing technology, this paper proposes a novel public PDP scheme, in which the trusted third-party agent (TPA) takes over most of the calculations from the mobile end-users. By using bilinear signature and Merkle hash tree (MHT), the scheme aggregates the verification tokens of the data file into one small signature to reduce communication and storage burden. MHT is also helpful to support dynamic data update. In our framework, the mobile terminal devices only need to generate some secret keys and random numbers with the help of trusted platform model (TPM) chips, and the needed computing workload and storage space is fit for mobile devices. Our scheme realizes provable secure storage service for resource-constrained mobile devices in mobile cloud computing.

Keywords:
Computer science Mobile cloud computing Cloud computing Merkle tree Computer network Mobile device Cloud storage Trusted Platform Module Server Distributed computing Mobile computing Computer security Hash function Operating system Cryptographic hash function

Metrics

73
Cited By
19.43
FWCI (Field Weighted Citation Impact)
20
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Provable Data Possession in Cloud Computing

Shuang TanJianfeng ZhangZhi Kun Chen

Journal:   Applied Mechanics and Materials Year: 2014 Vol: 513-517 Pages: 1406-1413
JOURNAL ARTICLE

Agent-based provable data possession scheme for mobile cloud computing

Jian YangJian WangHaihang WangDengqi Yang

Journal:   Journal of Computer Applications Year: 2013 Vol: 33 (3)Pages: 743-747
JOURNAL ARTICLE

Provable Multicopy Dynamic Data Possession in Cloud Computing

B M Bhavya

Journal:   International Journal of Scientific Research in Computer Science Engineering and Information Technology Year: 2017 Vol: 2 (3)Pages: 772-776
JOURNAL ARTICLE

Towards comprehensive provable data possession in cloud computing

Chaoling LiYue ChenPengxu TanGang Yang

Journal:   Wuhan University Journal of Natural Sciences Year: 2013 Vol: 18 (3)Pages: 265-271
JOURNAL ARTICLE

Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

Ayad BarsoumM.A. Hasan

Journal:   IEEE Transactions on Information Forensics and Security Year: 2014 Vol: 10 (3)Pages: 485-497
© 2026 ScienceGate Book Chapters — All rights reserved.