Open Access Open Access  Restricted Access Subscription or Fee Access

Trusted Third Party Auditing to Improve the Cloud Storage Security

V. Venkatesh, P. Parthasarathi

Abstract


Introduction of cloud storage service has made the users to access their data anywhere anytime without any trouble. Available systems that provide support for the remote data integrity are useful for quality of service testing but do not deal with server failure or handling misbehaving servers. The security issues that prevail in the data storage at cloud cause lot of threats to the users and cloud service providers. Available systems that provide support for the remote data integrity are useful for quality of service testing but do not deal with server failures or handling misbehaving servers. The proposed system ensures storage integrity and achieves strong cloud storage security with fast data error localization through the results provided by the auditing mechanism that is carried out by the third party auditor. Third party auditor carries out the public auditing in-order to maintain the integrity for the outsourced data that is present in cloud storage. Data integrity in ensured with the help of verification key along with erasure coded data, it also allows in handling the storage correctness and identification of misbehaving cloud server. The Audit Protocol Blocker is introduced in order to monitor the correctness of the Third Party Auditor by preventing the TPA from misusing the privileges that are provided to them by the cloud server.


Keywords


Data Integrity, Outsourced Data, Third Party Auditor (TPA), Audit Protocol Blocker (APB), Cloud User, Error Localization.

Full Text:

PDF

References


Bowers .K.D, Juels .A, and Oprea .A, “Proofs of Retrievability: Theory and Implementation,” Proc. ACM Workshop Cloud Computing Security (CCSW ’09), pp. 43-54, 2009.

Dodis .Y, Vadhan .S, and Wichs .D, “Proofs of Retrievability via Hardness Amplification,” Proc. Sixth Theory of Cryptography Conf. (TCC ’09), Mar. 2009.

Erway .C, Kupcu .A, Papamanthou .C, and Tamassia .R, “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS ’09), pp. 213-222, 2009.

Ren .K, Wang .C, and Wang .Q, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.

Shah .M.A, Baker .M, Mogul .J.C, and Swaminathan .R, “Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), pp. 1-6, 2007.

Wang .C, Chow .S.S.M, Wang .Q, Ren .K, and Lou .W, “Privacy- Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, preprint, 2012, doi:10.1109/TC.2011.245.

Wang .C, Ren .K, Lou .W, and Li .J, “Towards Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010

Wang .Q, Wang .C, Li .J, Ren .K, and Lou .W, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research in Computer Security (ESORICS ’09), pp. 355-370, 2009.

Wang .Q, Wang .C, Ren .K, Lou .W, and Li .J, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.

Wang .C, Wang .Q, Ren .K, and Lou .W, “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, Mar. 2010


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.