Open Access Open Access  Restricted Access Subscription or Fee Access

Shared Authority Based Privacy Preserving Authentication Protocol in De-duplication Cloud Computing

M. Brindha, S. Swarnamugi, R.P. Shermy, B. Leebha

Abstract


 

Cloud computing has changed the way computing takes place. It is the technology that enables outsourcing of computing and storage to a public cloud maintained by cloud service providers. Cloud users can use cloud storage and other facilities without capital investment in pay as you use fashion. Cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data may suffer from hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. As the data is stored in remote server in the data center of cloud service provider, there is security concern among the cloud users. This proposed mechanism ensures data integrity in cloud storage by utilizing third party auditing concept. The third party auditor is responsible to verify the integrity of data on behalf of cloud data owners.

 


Keywords


Public Auditing, Cloud Computing, Integrity Checking

Full Text:

PDF

References


B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf. Cloud Computing, pp. 295-302, 2012.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,”Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.

K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.

D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protection for the Masses,” Computer, vol. 45, no. 1, pp. 39-45, 2012.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-PreservingPublic Auditing for Data Storage Security in Cloud Computing,”Proc. IEEE INFOCOM, pp. 525-533, 2010.

B . Wang, M. Li, S.S. Chow, and H. Li, “Computing Encrypted Cloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf. Comm. and Network Security (CNS ’13), pp. 90-99, 2013.

R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Comm. ACM,vol. 21, no. 2, pp. 120-126, 1978.

The MD5 Message-Digest Algorithm (RFC1321).https://tools.ietf.org/html/rfc1321, 2014.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm.Security (CCS ’07), pp. 598-610, 2007.

H. Shacham and B. Waters, “Compact Proofs of Retrievability,”Proc. 14th Int’l Conf. Theory and Application of Cryptology and InformationSecurity: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.

C. Erway, A. Kupcu, C.Papamanthou, and R. Tamassia,“Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), pp. 213-222, 2009.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in CloudComputing,” Proc. 14th European Conf. Research in Computer Security(ESORICS’09), pp. 355-370, 2009.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS’09), pp. 1-9, 2009.

B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote DataChecking for Network Coding-Based Distributed Storage Systems,”Proc. ACM Workshop Cloud Computing Security Workshop (CCSW’10), pp. 31-42, 2010.

Y. Zhu, H. Wang, Z. Hu, G.-J.Ahn, H. Hu, and S.S Yau, “Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds,” Proc. ACM Symp. Applied Computing (SAC’11), pp. 1550-1557, 2011.

N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, “LT Codes-Based Secure and Reliable Cloud Storage Service,” Proc. IEEE INFOCOM, 2012.

B. Wang, B. Li, and H. Li, “Certificateless Public Auditing for Data Integrity in the Cloud,” Proc. IEEE Conf. Comm. and NetworkSecurity (CNS’13), pp. 276-284, 2013.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.