Education, Science, Technology, Innovation and Life
Open Access
Sign In

A Data Integrity Verification Scheme with Secure Deduplication in Smart Grid Cloud Storage

Download as PDF

DOI: 10.23977/acss.2019.31001 | Downloads: 27 | Views: 1077


Shaomin Zhang 1, Kang Huang 1, Baoyi Wang 1


1 Department of Control and Computer, North China Electric Power University, Huadian Road, Baoding, China

Corresponding Author

Shaomin Zhang


In order to solve the problem of data deduplication and data integrity in smart grid cloud storage, a data integrity verification scheme which can support security deduplication is proposed in the context of smart grid cloud storage. This scheme refers to an efficient and safe deduplication method based on the bloom filter, realizes the quick verification of the user's hash value and initialization value. In addition, the secure deduplication method is combined with S—PDP integrity verification mechanism, data segmentation and random sampling strategy, to realize the security deduplication and integrity verification of smart grid clients. By using erasure correction code, users can repair the damaged data. The analysis results show that this scheme can effectively reduce the computing cost and communication cost while ensuring that the cloud storage data of smart grid can be secure deduplicated and integrity verified.


Smart Grid, Cloud Storage, Secure Deduplication, Integrity Verification.


Shaomin, Z., Kang, H., Baoyi, W., A Data Integrity Verification Scheme with Secure Deduplication in Smart Grid Cloud Storage, Advances in Computer, Signals and Systems (2019) 3: 1-7. DOI:


[1] Zheng Ling, Yao Jiangang, The Construction of Power Cloud Integrated with Heterogeneous Application Service Systems [C]//THE 2016 International Conference on Communications, Information Management and Network Security (CIMNS).Shanghai, CHINA,2016:345-348.
[2] HE Yao, Wang Wenqing, Xue Fei, Study of massive data mining based on cloud computing [J]. Automation of Electric Power Systems, vol.34, no.15, pp. 15-18, 2013.
[3] Wang Dewen, Song Yaqi, Zhu Yongli. Intelligent power grid information platform based on cloud computing [J]. Automation of Electric Power Systems, 2010, 34(22):7-12.
[4] Dutch M, Freeman L. Understanding Data Deduplication Ratio[EB/OL].[2018-07-08].
[5] Zhang Taoyi. Research on data integrity detection in cloud storage [D].ShenZhen University, 2016.
[6] Li Zhike. Research on data integrity verification and Deduplication technology in cloud storage [D]. Guangdong University of Technology, 2015.
[7] Zheng Qingji, Xu Shouhuai.Secure and Efficient Proof of Storage with Deduplication[C]//Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy. San Antonio, USA: ACM Press, 2012: 1-12.
[8] Li Bin. Research on data integrity and deletion technology in cloud storage [D].Beijing University of Posts and Telecommunications, 2015.
[9] Zhang Lihong, Chen Jing, Du Ruiying, et al. Data Integrity Verification Method with Secure Deduplication in Cloud Storage [J]. Computer Engineering, 2017, 43(1):32-36, 42.
[10] Mao Zhen.Design and implementation of document ownership certificate protocol based on convergent encryption [D]. Xidian University, 2016.
[11] Liu Zhusong, Yang Zhangjie. Efficient and secure deduplication cloud storage scheme based on proof of ownership by Bloom filter[J]. Journal of Computer Applications, 2017,37(03):766-770.
[12] GONZALEZ-MAZANO L, ORFILA A. An efficient confidentiality-preserving proof of ownership for deduplication [J]. Journal of Network and Computer Applications, 2015, 50: 49 -59.

Downloads: 620
Visits: 30941

Sponsors, Associates, and Links

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.