An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing

被引:9
作者
Yu, Han [1 ,2 ]
Lu, Xiuqing [1 ,3 ]
Pan, Zhenkuan [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Natl Univ Def Technol, Coll Comp, Changsha 410073, Peoples R China
[3] Qingdao Univ, Coll Business, Dept Management Sci & Engn, Qingdao 266071, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
关键词
Cloud computing; Servers; Big Data; Data structures; Data integrity; Indexes; Dynamic auditing; authorization; cloud storage; data security; INTEGRITY; PRIVACY; VERIFICATION; SECURITY; SERVICES; SENSOR;
D O I
10.1109/ACCESS.2020.3016760
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, to utilize the abundant resources of cloud computing, most enterprise users prefer to store their big data on cloud servers for sharing and utilization. However, storing data in remote cloud servers is out of user's control and exposes to lots of security problems such data availability, unauthorized access and data integrity, among which data integrity is a challenging and urgent task in cloud computing. Many auditing schemes have been proposed to check the integrity of data in cloud, but these schemes usually have some disadvantages. One is that these auditing schemes cannot check which block is corrupt when the data is not integrated. The other is that there's no efficient authenticated data structure helping to achieve accurate auditing when the data needs to update frequently. To solve the problems, we propose a public auditing scheme for dynamic big data storage in cloud computing. Firstly, we design a dynamic index table, in which no elements need to be moved in insertion or deletion update operations. Secondly, when data in cloud is not integrated, the third-party auditor can detect which block is corrupt. Finally, an authorization is employed between the third party and cloud servers to prevent denial of service attack. The theoretical analysis and the simulation results demonstrate that our scheme is more secure and efficient.
引用
收藏
页码:151465 / 151473
页数:9
相关论文
共 40 条
  • [1] [Anonymous], 2007, Proc. ECRYPT Workshop Software Performance Enhancement for Encryption and Decryption
  • [2] [Anonymous], 2004, IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), DOI [10.1007/1-4020-7901-X_1, DOI 10.1007/1-4020-7901-X_1]
  • [3] Armbrust Michael, 2009, University of California, Berkeley, DOI DOI 10.1145/1721654.1721672
  • [4] Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
  • [5] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [6] IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges
    Cai, Hongming
    Xu, Boyi
    Jiang, Lihong
    Vasilakos, Athanasios V.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (01): : 75 - 87
  • [7] Cash D, 2013, LECT NOTES COMPUT SC, V7881, P279, DOI 10.1007/978-3-642-38348-9_17
  • [8] Towards data analysis for weather cloud computing
    Chang, Victor
    [J]. KNOWLEDGE-BASED SYSTEMS, 2017, 127 : 29 - 45
  • [9] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
  • [10] Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud
    Gan, Qingqing
    Wang, Xiaoming
    Fang, Xuefeng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (12)