Advertisement

Cluster Computing

, Volume 22, Supplement 3, pp 6891–6898 | Cite as

Privacy preserving auditing protocol for remote data storage

  • M. SugunaEmail author
  • S. Mercy Shalinie
Article
  • 144 Downloads

Abstract

In recent days, applications are becoming highly pervasive and enrich end user devices with various functionalities. The resource constraints at client side restrict the usage of many applications which need high storage and intensive computation. Cloud computing simplifies the deployment of large-scale distributed systems and enables advanced computational power with improved storage capabilities. Its evolution can be used for outsourcing data storage and processing. In spite of the relief, the clients no longer have control over their outsourced data which demands the purpose of ensuring the data intactness maintained by the Cloud Storage Server. For the verification of data correctness a third party trusted verifier is introduced in the proposed work which maintains dynamic metadata stored locally for the verification process. Bilinear mapping is used to ensure verification without retrieving the original data called blockless process. The verification proof generated using the proposed method is a small signature, which reduces the auditing overhead at the client side compared to existing solution. The proposed privacy preserving data auditing protocol relaxes the end users by reducing the computational overhead and achieves the verification of storage service.

Keywords

Privacy preserving Auditing Bilinear mapping Data intactness Blockless verification Remote storage 

References

  1. 1.
    Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Special Publication 800-145. National Institute of Standards and Technology (NIST), Gaithersburg (2011)CrossRefGoogle Scholar
  2. 2.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  3. 3.
    Carretero, J., Blas, J.G.: Introduction to cloud computing: platforms and solutions. Cluster Comput. 17(4), 1225–1229 (2014)CrossRefGoogle Scholar
  4. 4.
    Velte, A.T., Velte, T.J., Elsenpeter, R.C.: Cloud Computing: A Practical Approach, 1st edn. McGraw-Hill Inc., New York (2010)Google Scholar
  5. 5.
    Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRefGoogle Scholar
  6. 6.
    Soghoian, C.: How dropbox sacrifices user privacy for cost savings, Slight Paranoia Blog. http://paranoia.dubfire.net/2011/04/how-dropbox-sacrifices-user-privacy-for.html (2011)
  7. 7.
    Dropbox was accessible with no password, oops, TekGoblin Blog. http://www.tekgoblin.com/2011/06/20/dropbox-was-accessible-with-no-password-oops/ (2011)
  8. 8.
    Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Provable data possession at untrusted stores. In: Proceeding of ACM CCS’07, Alexandria, pp. 598–609 (2007)Google Scholar
  9. 9.
    Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12 (2011)CrossRefGoogle Scholar
  10. 10.
    Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceeding of 14th ACM Conference Computer and Communication Security (CCS ’07), pp. 584–597 (2007)Google Scholar
  11. 11.
    Shacham H., Waters, B.: Compact proofs of retrievability. In: Proceeding of Asiacrypt’08, Sydney, pp. 90–107 (2008)CrossRefGoogle Scholar
  12. 12.
    Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Giuseppe, A., Seny, K., Jonathan, K.: Proofs of storage from homomorphic identification protocols. In: Proceeding of Asiacrypt’09, Tokyo, pp. 319–333 (2009)Google Scholar
  14. 14.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. In: Proceeding of ESORICS’09, France, pp. 355–370 (2009)Google Scholar
  15. 15.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar
  16. 16.
    Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceeding of ACM Symposium Applied Computing, pp. 1550–1557 (2011)Google Scholar
  17. 17.
    Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 717–1726 (2013)CrossRefGoogle Scholar
  18. 18.
    Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29(7), 1709–1715 (2013)CrossRefGoogle Scholar
  20. 20.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Cryptology ePrint Archive Report 2009/281 (2009)CrossRefGoogle Scholar
  21. 21.
    Merkle, R.C.: Protocols for public key cryptosystems. In: Proceeding of IEEE Symposium on Security and Privacy, Oakland. (1980)Google Scholar
  22. 22.
    Daniel, E., Vasanthi, N.A.: LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment, Cluster Comput.  https://doi.org/10.1007/s10586-017-1382-6 (2017)CrossRefGoogle Scholar
  23. 23.
    Bleumer, G.: Random Oracle model. In: Encyclopedia of Cryptography and Security, Springer, New York. pp. 1027–1028 (2011)Google Scholar
  24. 24.
    Zhang, J., Meng, H., Yu, Y.: Achieving public verifiability and data dynamics for cloud data in the standard model. Cluster Comput. 20, 2641–2653 (2017)CrossRefGoogle Scholar
  25. 25.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Advances in Cryptology—ASIACRYPT 2001. LNCS 2248, pp. 514–532 (2001)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringThiagarajar College of EngineeringMaduraiIndia

Personalised recommendations