Active-Hash-Table Based Public Auditing for Secure Cloud Storage

  • Balakrishnan K SRM University

Abstract

Cloud storage is an increasingly popular application of cloud computing, which can provide on-demand outsourcing data services for both organizations and individuals. However, users may not fully trust the cloud service providers (CSPs) in that it is difficult to determine whether the CSPs meet their legal expectations for data security. Therefore, it is critical to develop efficient auditing techniques to strengthen data owners' trust and confidence in cloud storage. In this paper, It present a novel public auditing scheme for secure cloud storage which is a new two-dimensional data structure located at a third parity auditor (TPA) to record the data property information for dynamic auditing. Differing from the existing works, the proposed scheme migrates the authorized information from the CSP to the TPA, and thereby significantly reduces the computational cost and communication overhead. Meanwhile, exploiting the structural advantages of our scheme can also achieve higher updating efficiency than the state-of-the-art schemes. In addition, It extend our scheme to support privacy preservation by combining the homomorphic authenticator based on the public key with the random masking generated by the TPA, and achieve batch auditing by employing the aggregate BLS signature technique. We formally prove the security of the proposed scheme, and evaluate the auditing performance by detailed experiments and comparisons with the existing ones. The results demonstrate that the proposed scheme can effectively achieve secure auditing for cloud storage, and outperforms the previous schemes in computation complexity, storage costs and communication overhead.

References

[1] H. Dewan and R. C. Hansdah. ʺA Survey of Cloud Storage Facilities ʺ, Proc. 7th IEEE World Congress on Services, pp. 224‐231, July 2011.

[2] C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou. ʺToward Secure and Dependable Storage Services in Cloud Computingʺ, IEEE Trans. Service Computing, vol. 5, no. 2, pp. 220‐232, 2012.

[3] K. Ren, C. Wang and Q. Wang. “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69– 73, 2012.

[4] J. Ryoo, S. Rizvi, W. Aiken and J. Kissell. ʺCloud Security Auditing: Challenges and Emerging Approachesʺ, IEEE Security & Privacy, vol. 12, no. 6, pp. 68‐74, 2014.

[5] C. Wang, K. Ren, W. Lou and J. Li. ʺToward Publicly Auditable Secure Cloud Data Storage Servicesʺ, IEEE network, vol. 24, no. 4, pp. 19‐24, 2010.

[6] Q. Wang, C. Wang, K. Ren, W. Lou and J. Li. ‘‘Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing,’’ IEEE Trans. on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847‐859, 2011.

[7] F. Sebé, J. Domingo‐Ferrer, A. Martínez‐Ballesté, Y. Deswarte and J.‐J. Quisquater, “Efficient Remote Data Possession Checking in Critical Information Infrastructures,” IEEE Trans. Knowledge Data Eng., vol. 20, no. 8, pp. 1034‐1038, 2008.

[8] A. Juels and B.S. Kaliski Jr., “PoRs: Proofs of Retrievability for Large Files,” Proc. ACM Conf. Computer and Communications Security (CCS ’07), pp. 584‐597, 2007.
[9] G. Ateniese, R.B. Johns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, ‘‘Provable Data Possession at Untrusted Stores,’’ Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS), pp. 598‐609, 2007.

[10] K. Yang and X. Jia. ʺData Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunitiesʺ. World Wide Web, vol. 15, no. 4, pp. 409‐428, 2012
Statistics
170 Views | 40 Downloads
How to Cite
K, B. (2019). Active-Hash-Table Based Public Auditing for Secure Cloud Storage. Innovare Journal of Engineering & Technology. Retrieved from https://innovareacademics.in/journals/index.php/ijet/article/view/19914
Section
Editorial