An efficient data integrity auditing protocol for cloud computing

被引:47
作者
Garg, Neenu [1 ]
Bawa, Seema [1 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 109卷
关键词
Data integrity; Cloud security; Third party auditing; Data integrity auditing; 3-FACTOR USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; KEYWORD SEARCH; SCHEME; PRIVACY;
D O I
10.1016/j.future.2020.03.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud data storage has brought a revolution in Information Technology (IT) sector with its inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing data on cloud servers, users can reduce the hardware expenditures and can simplify the data management process. A Cloud Service Provider (CSP) is responsible for offering secure data storage services. However, using these services in a secured manner and ensuring data integrity in these remote cloud servers remains to be an issue for the clients. In this paper, we propose an efficient approach for data integrity auditing in cloud computing. The objective of proposed protocol is to minimize the computational complexity of client during system setup phase of the auditing protocol. Based on the properties of bilinear pairings, the proposed protocol is publicly verifiable and supports dynamic operations on data. The security of proposed protocol relies on the stability of Computational Diffie Hellman Problem (CDHP) in a Random Oracle Model (ROM). Finally, the performance of proposed protocol has been evaluated by implementing a prototype of the protocol and conducting experiments. The results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:306 / 316
页数:11
相关论文
共 50 条
  • [41] Data Integrity and Privacy Model in Cloud Computing
    Al-Jaberi, Mohammed Faez
    Zainal, Anazida
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 280 - 284
  • [42] Batch verification of the data integrity in cloud computing
    Luo, Wenjun
    Liu, Lu
    Yuan, Shumei
    Zhang, Xiaofang
    International Journal of Digital Content Technology and its Applications, 2012, 6 (15) : 373 - 380
  • [43] An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing
    Yu, Han
    Lu, Xiuqing
    Pan, Zhenkuan
    IEEE ACCESS, 2020, 8 (08): : 151465 - 151473
  • [44] Public auditing for shared cloud data with efficient and secure group management
    Tian, Hui
    Nan, Fulin
    Jiang, Hong
    Chang, Chin-Chen
    Ning, Jianting
    Huang, Yongfeng
    INFORMATION SCIENCES, 2019, 472 : 107 - 125
  • [45] Cloud Audit: A Data Integrity Verification Approach for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 142 - 151
  • [46] Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) : 331 - 346
  • [47] A provably secure and public auditing protocol based on the bell triangle for cloud data
    Tian, Junfeng
    Wang, Haoning
    COMPUTER NETWORKS, 2021, 195
  • [48] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [49] A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System
    Huang, Pei
    Fan, Kai
    Yang, Hanzhe
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    IEEE ACCESS, 2020, 8 (94780-94794) : 94780 - 94794
  • [50] An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
    Tian, Jun-Feng
    Wang, Hao-Ning
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)