An efficient data integrity auditing protocol for cloud computing

被引:48
作者
Garg, Neenu [1 ]
Bawa, Seema [1 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 109卷
关键词
Data integrity; Cloud security; Third party auditing; Data integrity auditing; 3-FACTOR USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; KEYWORD SEARCH; SCHEME; PRIVACY;
D O I
10.1016/j.future.2020.03.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud data storage has brought a revolution in Information Technology (IT) sector with its inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing data on cloud servers, users can reduce the hardware expenditures and can simplify the data management process. A Cloud Service Provider (CSP) is responsible for offering secure data storage services. However, using these services in a secured manner and ensuring data integrity in these remote cloud servers remains to be an issue for the clients. In this paper, we propose an efficient approach for data integrity auditing in cloud computing. The objective of proposed protocol is to minimize the computational complexity of client during system setup phase of the auditing protocol. Based on the properties of bilinear pairings, the proposed protocol is publicly verifiable and supports dynamic operations on data. The security of proposed protocol relies on the stability of Computational Diffie Hellman Problem (CDHP) in a Random Oracle Model (ROM). Finally, the performance of proposed protocol has been evaluated by implementing a prototype of the protocol and conducting experiments. The results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:306 / 316
页数:11
相关论文
共 51 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], 2019, IEEE T CLOUD COMPUT
[3]  
[Anonymous], IEEE T BIG DATA
[4]  
[Anonymous], ARXIV150700939
[5]  
[Anonymous], 2011, Encyclopedia of Cryptography and Security
[6]  
Ateniese G, 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[7]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[8]   Secure clustering for efficient data dissemination in vehicular cyber-physical systems [J].
Bali, Rasmeet S. ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :476-492
[9]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[10]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615