Skip to main content

Auditing Mechanism to Verify the Integrity of Remote Data in Cloud

  • Conference paper
  • First Online:
Informatics and Communication Technologies for Societal Development

Abstract

Cloud computing is the one which offers infrastructure to the client on a pay-as-you-use model by leveraging on the Internet technology. As this model depicts the electricity billing, it is often termed as utility computing. As the use of cloud increases day by day, the concerns about cloud also increase. There are a number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. In order to solve the security issues, there are a number of solutions proposed. This chapter focuses on the integrity assurance strategy for remote data. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The analysis and simulation results show that our proposed auditing protocols are secure and it reduces the computation load and communication cost of the auditor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609, ACM, Alexandria, VA, USA (2007)

    Google Scholar 

  2. Shah, M.A., Swaminathan, R., Baker, M.: Privacy-Preserving Audit and Extraction of Digital Contents, 2008, Report 2008/186, Cryptology ePrint Archive

    Google Scholar 

  3. Juels, A., Kaliski, B.S. Jr.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), pp. 584–597, Alexandria, VA, USA (2007)

    Google Scholar 

  4. http://courses.csail.mit.edu/6.897/spring04/L25.pdf

  5. Chang, E.C., Xu, J.: Remote integrity check with dishonest storage server. In: Proceedings of the 13th European Symposium Research in Computer Security (ESORICS’08), pp. 223–237, Malaga, Spain (2008)

    Google Scholar 

  6. Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. In: IEEE Transactions on Parallel and Distributed Systems, pp. 2231–2244. (2012)

    Google Scholar 

  7. Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), (2009)

    Google Scholar 

  8. Mell, P., Grance, T.: The NIST definition of cloud computing. National Institute of Standards and Technology, Tech. Rep., (2009)

    Google Scholar 

  9. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  10. Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing: A Practical Approach, 1st edn. McGraw-Hill, Inc., New York (2010)

    Google Scholar 

  11. Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (sundr). In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation, pp. 121–136, Berkeley, CA, USA (2004)

    Google Scholar 

  12. Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative internet backup scheme. In: USENIX Annual Technical Conference, General Track. USENIX, pp. 29–41. (2003)

    Google Scholar 

  13. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (eds.) ASIACRYPT.Lecture Notes in Computer Science, vol. 5350, pp. 90–107. Springer, Melvourne, Australia (2008)

    Google Scholar 

  14. Erway, C.C., K¨upc,¨u, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM Conference on Computer and Communications Security, pp. 213–222, ACM, Chicago, IL, USA (2009)

    Google Scholar 

  15. Kan Yang, Xiaohua Jia: An efficient and secure dynamic auditing protocol for data storage in Cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1–11 (2012)

    Google Scholar 

  16. Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Nirmala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Nirmala, V., Shanmugalakshmi, R., Kiruthika, M. (2015). Auditing Mechanism to Verify the Integrity of Remote Data in Cloud. In: Rajsingh, E., Bhojan, A., Peter, J. (eds) Informatics and Communication Technologies for Societal Development. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1916-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1916-3_6

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1915-6

  • Online ISBN: 978-81-322-1916-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics