Cloud Audit: A Data Integrity Verification Approach for Cloud Computing

被引:25
作者
Saxena, Rajat [1 ]
Dey, Somnath [1 ]
机构
[1] Indian Inst Technol Indore, Indore, Madhya Pradesh, India
来源
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 | 2016年 / 89卷
关键词
Combinatorial Batch Codes (CBC); Homomorphic Tag; Paillier Homomorphic Cryptography ( PHC); Proof of Retrievability (PoR); Provable Data Possession (PDP); Third Party Auditing; DATA POSSESSION;
D O I
10.1016/j.procs.2016.06.024
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is the fastest growing and promising field in the sector of service provision. It is a very trendy situation for security implementation in the Cloud. Thus, security restrictions are increasing on users and service providers as the growth of Cloud environment. The purpose of this paper is to suggest a better and efficient integrity verification technique for data (referred as "Cloud Audit"). The building blocks of our technique are a variant of the Paillier homomorphic cryptography system with homomorphic tag and combinatorial batch codes. A Paillier Homomorphic Cryptography (PHC) system used to obtain homomorphic encryption on data blocks. Homomorphic tags along with the Paillier cryptography system assigns a special verifiable value to each data block, which helps us in unleashing data operations on this block. Combinatorial batch codes are used to assign and store integral data into different distributed cloud sever. To demonstrate our approach, we have implemented an application based on Hadoop and MapReduce framework. We have tested this application based on various parameters. Effectiveness of the proposed method has been shown by the experimental results. Our method has shown large improvement over the other modern methods. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:142 / 151
页数:10
相关论文
共 20 条
[1]  
Ateniese G., 2008, IACR CRYPTOLOGY EPRI, V114
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Bowers K.D., 2009, Workshop on Cloud computing Security (CCSW), P43, DOI DOI 10.1145/1655008.1655015
[4]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[5]   Using algebraic signatures to check data possession in cloud storage [J].
Chen, Lanxiang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1709-1715
[6]  
Cloudera, 2014, CLOUD DOWNL GET STAR
[7]  
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
[8]  
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[9]   A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability [J].
Hao, Zhuo ;
Zhong, Sheng ;
Yu, Nenghai .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1432-1437
[10]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584