An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud

被引:0
作者
Arjun, U. [1 ]
Vinay, S. [2 ]
机构
[1] PESITM, Dept IS & E, Shivamogga, India
[2] PESCE, Dept Comp Sci & Engn, Mandya, India
来源
EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018 | 2019年 / 545卷
关键词
Cloud storage; Provable data possession; Cloud security; Public auditing;
D O I
10.1007/978-981-13-5802-9_27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the huge development in cloud computing services, cloud storage becomes an important service for individuals and organization, with the capabilities of on-demand outsourcing application. After outsourcing the data, owner has no physical control over remotely present data. To verify the data integrity, several efficient cryptographic techniques related to provable data possession (PDP) were proposed to check the remote data integrity without downloading it from the cloud storage server. In this paper, with the knowledge of interactive PDP protocol, we propose an efficient public auditing method based on probabilistic queries and periodic verification to improve the performance of audit service. The method reduces the leakage of the data by public auditing and reduces the computational and communication cost of audit services by selecting the secured parameter. Our experimental result shows it incurs less communication cost.
引用
收藏
页码:285 / 291
页数:7
相关论文
共 20 条
[1]  
Abo-Alian A., 2016, ASIAN J INF TECHNOL, V15, P1056
[2]   Auditing-as-a-Service for Cloud Storage [J].
Abo-alian, Alshaimaa ;
Badr, N. L. ;
Tolba, M. F. .
INTELLIGENT SYSTEMS'2014, VOL 1: MATHEMATICAL FOUNDATIONS, THEORY, ANALYSES, 2015, 322 :559-568
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]  
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[5]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[6]   Secure Cloud Storage Meets with Secure Network Coding [J].
Chen, Fei ;
Xiang, Tao ;
Yang, Yuanyuan ;
Chow, Sherman S. M. .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) :1936-1948
[7]   On Indistinguishability in Remote Data Integrity Checking [J].
Fan, Xinyu ;
Yang, Guomin ;
Mu, Yi ;
Yu, Yong .
COMPUTER JOURNAL, 2015, 58 (04) :823-830
[8]   Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation [J].
Jiang, Tao ;
Chen, Xiaofeng ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2363-2373
[9]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[10]  
Kim IK, 2016, IEEE INT CONF CLOUD, P1, DOI [10.1109/CLOUD.2016.9, 10.1109/CLOUD.2016.0011]