ES-DAS: An Enhanced and Secure Dynamic Auditing Scheme for Data Storage in Cloud Environment

被引:4
作者
Daniel, Esther [1 ]
Vasanthi, N. A. [2 ]
机构
[1] Karunya Inst Technol & Sci, Dept CSE, Coimbatore, Tamil Nadu, India
[2] Adithya Inst Technol, Dept CSE, Coimbatore, Tamil Nadu, India
来源
JOURNAL OF INTERNET TECHNOLOGY | 2020年 / 21卷 / 01期
关键词
Cloud computing; Data storage; Security; Integrity; Dynamic auditing;
D O I
10.3966/160792642020012101016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing sensitive data on cloud storage is a service in demand. Cloud Storage lessens the burden on the user by discarding the need to possess costly infrastructure setup and its need for continuous maintenance. However, security, privacy, and integrity of the data remain critical due to the absence of control and physical proprietorship over the delicate data by the proprietors. Therefore, it is significant to develop an enhanced data auditing scheme to guarantee data owners that their data is safe and secure in the remotely hosted cloud storage providers. In this paper, an enhanced dynamic auditing scheme for providing integrity assurance of outsourced data is presented. The proposed scheme is based on Elgamal signature on a conic curve and homomorphic function. This scheme incorporates trusted third party auditor for detecting accidental or intentional data modifications to provide integrity assurance to the data owners. With the adoption of ElGamal signatures and homomorphic function, this scheme achieves benefits like privacy preservation, reduced computation, communication and storage cost. The performance of the proposed ES-DAS scheme is evaluated by detailed experimental analysis in comparison with other existing techniques. The results prove to be efficient and secure in terms of computation, communication and storage costs on the system entities.
引用
收藏
页码:173 / 182
页数:10
相关论文
共 21 条
[1]  
[Anonymous], INT C COMP APPL SYST
[2]  
[Anonymous], P ADV INTELLIGENT CY
[3]  
[Anonymous], CLOUD COMPUTING CHAL
[4]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[5]   Remote Data Checking Using Provable Data Possession [J].
Ateniese, Giuseppe ;
Burns, Randal ;
Curtmola, Reza ;
Herring, Joseph ;
Khan, Osama ;
Kissner, Lea ;
Peterson, Zachary ;
Song, Dawn .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
[6]   Using algebraic signatures to check data possession in cloud storage [J].
Chen, Lanxiang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1709-1715
[7]   LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment [J].
Daniel, Esther ;
Vasanthi, N. A. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1) :1247-1258
[8]   Comparative analysis of cloud data integrity auditing protocols [J].
Garg, Neenu ;
Bawa, Seema .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :17-32
[9]   A Lightweight And privacy-preserving public cloud auditing scheme without bilinear pairings in smart cities [J].
Han, Jing ;
Li, Yanping ;
Chen, Weifeng .
COMPUTER STANDARDS & INTERFACES, 2019, 62 :84-97
[10]  
Huang W., 2018, INT J COMPUTERS APPL, P1