Public Auditing Scheme for Integrity Verification in Distributed Cloud Storage System

被引:25
作者
Mahalakshmi, K. [1 ]
Kousalya, K. [2 ]
Shekhar, Himanshu [3 ]
Thomas, Aby K. [4 ]
Bhagyalakshmi, L. [5 ]
Suman, Sanjay Kumar [6 ]
Chandragandhi, S. [7 ]
Bachanna, Prashant [8 ]
Srihari, K. [9 ]
Sundramurthy, Venkatesa Prabhu [10 ]
机构
[1] SSM Coll Engn, Dept Comp Sci Engn, Namakkal, India
[2] Kongu Engn Coll, Dept Comp Sci Engn, Erode, India
[3] Hindustan Inst Technol & Sci, Dept Elect & Commun Engn, Chennai 603103, Tamil Nadu, India
[4] Alliance Univ, Alliance Coll Engn & Design, Dept Elect & Commun Engn, Bengaluru 562106, Karnataka, India
[5] Rajalakshmi Engn Coll, Dept Elect & Commun Engn, Chennai, Tamil Nadu, India
[6] Bharat Inst Engn & Technol, Dept Elect & Commun Engn, Hydrabad, India
[7] Jct Coll Engn & Technol, Dept Comp Sci Engn, Coimbatore, Tamil Nadu, India
[8] SNS Coll Technol, Dept Comp Sci Engn, Coimbatore, Tamil Nadu, India
[9] Bharat Inst Engn & Technol, Dept Elect & Commun Engn, Hyderabad 501510, Telangana, India
[10] Addis Ababa Sci & Technol Univ, Dept Chem Engn, Addis Ababa, Ethiopia
关键词
D O I
10.1155/2021/8533995
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud storage provides a potential solution replacing physical disk drives in terms of prominent outsourcing services. A threaten from an untrusted server affects the security and integrity of the data. However, the major problem between the data integrity and cost of communication and computation is directly proportional to each other. It is hence necessary to develop a model that provides the trade-off between the data integrity and cost metrics in cloud environment. In this paper, we develop an integrity verification mechanism that enables the utilisation of cryptographic solution with algebraic signature. The model utilises elliptic curve digital signature algorithm (ECDSA) to verify the data outsources. The study further resists the malicious attacks including forgery attacks, replacing attacks and replay attacks. The symmetric encryption guarantees the privacy of the data. The simulation is conducted to test the efficacy of the algorithm in maintaining the data integrity with reduced cost. The performance of the entire model is tested against the existing methods in terms of their communication cost, computation cost, and overhead cost. The results of simulation show that the proposed method obtains reduced computational of 0.25% and communication cost of 0.21% than other public auditing schemes.
引用
收藏
页数:5
相关论文
共 20 条
[1]  
Abdul-Jabbar SS., 2020, J Southwest Jiaotong Univ, V55, DOI [10.35741/issn.0258-2724.55.1.11, DOI 10.35741/ISSN.0258-2724.55.1.11]
[2]  
Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[5]   Using algebraic signatures to check data possession in cloud storage [J].
Chen, Lanxiang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1709-1715
[6]   Dynamic Provable Data Possession [J].
Erway, C. Chris ;
Kupcu, Alptekin ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
[7]   Understanding Cloud Computing Vulnerabilities [J].
Grobauer, Bernd ;
Walloschek, Tobias ;
Stoecker, Elmar .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :50-57
[8]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[9]  
Shacham H, 2008, LECT NOTES COMPUT SC, V5350, P90, DOI 10.1007/978-3-540-89255-7_7
[10]   An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data [J].
Shen, Jian ;
Shen, Jun ;
Chen, Xiaofeng ;
Huang, Xinyi ;
Susilo, Willy .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) :2402-2415