An efficient data integrity auditing protocol for cloud computing

被引:47
作者
Garg, Neenu [1 ]
Bawa, Seema [1 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 109卷
关键词
Data integrity; Cloud security; Third party auditing; Data integrity auditing; 3-FACTOR USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; KEYWORD SEARCH; SCHEME; PRIVACY;
D O I
10.1016/j.future.2020.03.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud data storage has brought a revolution in Information Technology (IT) sector with its inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing data on cloud servers, users can reduce the hardware expenditures and can simplify the data management process. A Cloud Service Provider (CSP) is responsible for offering secure data storage services. However, using these services in a secured manner and ensuring data integrity in these remote cloud servers remains to be an issue for the clients. In this paper, we propose an efficient approach for data integrity auditing in cloud computing. The objective of proposed protocol is to minimize the computational complexity of client during system setup phase of the auditing protocol. Based on the properties of bilinear pairings, the proposed protocol is publicly verifiable and supports dynamic operations on data. The security of proposed protocol relies on the stability of Computational Diffie Hellman Problem (CDHP) in a Random Oracle Model (ROM). Finally, the performance of proposed protocol has been evaluated by implementing a prototype of the protocol and conducting experiments. The results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:306 / 316
页数:11
相关论文
共 50 条
  • [21] A Flexible Distributed Storage Integrity Auditing Mechanism in Cloud Computing
    Salma, T. J.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 283 - 287
  • [22] Towards Immutability: A Secure and Efficient Auditing Framework for Cloud Supporting Data Integrity and File Version Control
    Bappy, Faisal Haque
    Zaman, Saklain
    Islam, Tariqul
    Rizvee, Redwan Ahmed
    Park, Joon S.
    Hasan, Kamrul
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6801 - 6806
  • [23] Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 2019 - 2032
  • [24] Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
    Shen, Wenting
    Yu, Jia
    Yang, Ming
    Hu, Jiankun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4593 - 4606
  • [25] An Algorithm to Enhance Data Integrity in Cloud Computing
    Mothlabeng, Moloko P.
    Mathonsi, Topside E.
    Muchenje, Tonderai
    Du Plessis, Deon P.
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 418 - 424
  • [26] Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security
    Liu, Dengzhi
    Shen, Jian
    Vijayakumar, Pandi
    Wang, Anxi
    Zhou, Tianqi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10851 - 10870
  • [27] An Efficient Cloud Auditing Scheme for Data Integrity and Identity-Privacy of Multiple Uploaders
    Al-Odat, Zeyad
    Khan, Samee
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 8 - 13
  • [28] Multiple-replica integrity auditing schemes for cloud data storage
    Lin, Yangfei
    Li, Jie
    Jia, Xiaohua
    Ren, Kui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07)
  • [29] Lightweight integrity auditing of edge data for distributed edge computing scenarios
    Qiao, Liping
    Li, Yanping
    Wang, Feng
    Yang, Bo
    AD HOC NETWORKS, 2022, 133
  • [30] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12)