Open Access Open Access  Restricted Access Subscription or Fee Access

Security and Analysis for Batch Transparency and Dynamic Storage in Cloud Computing

R. Gnanajeyaraman, A.S. Deepumon, Vishnuthulasidharan Vishnuthulasidharan

Abstract


Cloud computing brings the new technology for the IT environment. Cloud Computing maintains software and database in the centralized large data centers. Using cloud computing, we can share our resources and services from different location, in open environment. We may face some security problems, when we develop such cloud applications, as everything is stored in the large data centers. The services from these data centers cannot be trusted. In cloud environment security is the main challenge. So we have o ensure the integrity on data storage in cloud computing on behalf of the cloud client, we allow the TPA to verify the integrity of dynamic data stored in cloud. TPA eliminates the involvement of client to audit their data, which is stored in the cloud server. Data are stored in form of Merkle – Hash tree structure. TPA checks the integrity of the data with help of the bilinear aggregate Signature for multi user setting and carries multiple auditing tasks simultaneously. Our proposed scheme achieves batch auditing for multiple physical locations (multi server). If there occurs any server failure, using this schemes data to maintain integrity. No delegation for TPA to audit user’s data.

Keywords


Cloud Server, Public Auditability, Batch Auditing

Full Text:

PDF

References


A. Juels and B. S. Kaliski, Jr,( 2007), “Pors: proofs of retrievability for large files,” in Proc. of CCS’07. New York, NY, USA: ACM, pp. 584–597.

D. Boneh, B. Lynn, and H. Shacham, (2001), “Short signatures from the weil pairing,” in Proc. of ASIACRYPT’01. London, UK: Springer- Verlag, pp. 514–532.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, (2007),“Provable data possession at untrusted stores,” in Proc. of CCS’07. New York, NY, USA: ACM, pp. 598–609.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, (2008), “Scalable and efficient provable data possession,” in Proc. of SecureComm’08. New York, NY, USA: ACM, pp. 1–10.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, (2009), “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09. Saint Malo, France: Springer- Verlag, pp. 355–370.

Q. Wang, K. Ren, W. Lou, and Y. Zhang, (2009), “Dependable and secure sensor data storage with dynamic integrity assurance,” in Proc. of IEEE INFOCOM’09, Rio de Janeiro, Brazil, pp. 954– 962.

T. Schwarz and E. L. Miller, (2006), “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” in Proc. of ICDCS’06, Lisboa, Portugal, pp. 12–12.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09. Saint Malo, France: SpringerVerlag, 2009, pp. 355–370.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proc. of CCS’07. New York, NY, USA: ACM, 2007, pp. 598–609.

A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in Proc. of CCS’07. New York, NY, USA: ACM, 2007, pp. 584–597.

H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proc. of ASIACRYPT’08. Melbourne, Australia: Springer-Verlag, 2008, pp. 90–107.

K. D. Bowers, A. Juels, and A. Oprea, “Proofs of retrievability:Theory and implementation,” Cryptology ePrint Archive, Report 2008/175, 2008.

M. Naor and G. N. Rothblum, “The complexity of online memory checking,” in Proc. of FOCS’05, Pittsburgh, PA, USA, 2005, pp. 573–584.

E.-C. Chang and J. Xu, “Remote integrity check with dishonest storage server,” in Proc. of ESORICS’08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 223–237

Qian Wang,Cong Wang,Kui Ren,Wenjing Lou and Jin Li ., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC), Macau, China, Jun. 18-21, 2012


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.