Auditing-as-a-Service for Cloud Storage

被引:7
作者
Abo-alian, Alshaimaa [1 ]
Badr, N. L. [1 ]
Tolba, M. F. [1 ]
机构
[1] Ain Shams Univ, Fac Informat & Comp Sci, Cairo, Egypt
来源
INTELLIGENT SYSTEMS'2014, VOL 1: MATHEMATICAL FOUNDATIONS, THEORY, ANALYSES | 2015年 / 322卷
关键词
cloud storage; auditing; probabilistic encryption; fountain codes; cryptographic hash algorithms;
D O I
10.1007/978-3-319-11313-5_49
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Storage Service (CSS) is a vital service of cloud computing which relieves the burden of storage management, cost and maintenance. However, Cloud storage introduces new security and privacy challenges that make data owners worry about their data. It is essential to have an auditing service to verify the integrity of outsourced data and to prove to data owners that their data is correctly stored in the Cloud. Recently, many researchers have focused on validating the integrity of outsourced data and proposed various schemes to audit the data stored on CSS. However, most of those schemes deal with static and single copy data files and do not consider data dynamic operations on replicated data. Furthermore, they do not have the facility to repair corrupt data. In this paper, we address these challenging issues and propose a public auditing scheme for multiple-copy outsourced data in CSS. Our scheme achieves better reliability, availability, and scalability by supporting replication and data recovery.
引用
收藏
页码:559 / 568
页数:10
相关论文
共 17 条
[1]  
[Anonymous], 2013, P INT WORKSH SEC CLO, DOI DOI 10.1145/2484402.2484408
[2]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5912, P319, DOI 10.1007/978-3-642-10366-7_19
[3]  
Barsoum A. F., 2012, Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), P829, DOI 10.1109/CCGrid.2012.55
[4]  
Bo Chen, 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P515, DOI 10.1109/ICDCSW.2012.57
[5]  
Etemad M., 2013, Proceedings of the 11th International Conference on Applied Cryptography and Network Security, P1
[6]  
Ho T., 2003, SCI COMMONS
[7]  
Hongwei Liu, 2013, Journal of Networks, V8, P373, DOI 10.4304/jnw.8.2.373-380
[8]  
Jia X., 2012, 7 ACM S INF COMP COM
[9]  
Liu FF, 2011, INT CONF CLOUD COMPU, P290, DOI 10.1109/CCIS.2011.6045077
[10]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223