Cloud Storage–Optimization of Initial Phase for Privacy-Preserving Public Auditing

  • Deepak Kumar VermaEmail author
  • Purnima Gupta
  • Rajesh Kumar Tyagi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 904)


The integrity of data confirms that an unapproved user cannot temper the outsourced data in cloud storage. The cloud storage needs to be secure from unapproved tempering. For integrity verification process, data owner generates the signature which is sent to the third-party auditor. It is a one-time process, but it increases the overhead of the data owner. We have analyzed the existing data integrity auditing schemes along with their distinctions. The proposed system supports privacy-preserving integrity auditing by using homomorphic linear authentication and employing Boneh–Lynn–Shacham-based signature technique. We extend our research to enable the data owner to speed up the initial phase through detailed experiments and comparisons between single-thread and multi-thread models using different core of CPUs. The proposed scheme demonstrated by using multithreading architecture on multi-core CPU for getting better performance.


Cloud service provider Third-party auditor (TPA) Data integrity Provable data possession (PDP) Proof of retrievability (POR) 


  1. 1.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598–609 (2007)Google Scholar
  2. 2.
    Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 9 (2008)Google Scholar
  3. 3.
    Chen, K.Y., Chang, J.M., Hou, T.W.: Multithreading in Java: performance and scalability on multicore systems. IEEE Trans. Comput. 60(11), 1521–1534 (2011)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data (2017)Google Scholar
  5. 5.
    Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of 18th International Conference on Data Engineering, pp. 29–38 IEEE (2002)Google Scholar
  6. 6.
    Kaustubh, S., Jog, V.V.: Article: A Survey on Integrity Checking for Outsourced Data in Cloud using TPA. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(1), 6–9 (2016)Google Scholar
  7. 7.
    Kumar, N.S., Lakshmi, G.R., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015)CrossRefGoogle Scholar
  8. 8.
    Lin, L., Liu, T., Hu, J., Ni, J.: PQsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intell. 3(3), 202–214 (2016)CrossRefGoogle Scholar
  9. 9.
    Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., Choo, K.K.R.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. (2017)Google Scholar
  10. 10.
    Mell, P., Grance, T.: The NIST definition of cloud computing. Nat. Inst. Stand. Technol. 53(6), 50 (2009)Google Scholar
  11. 11.
    Mutyalanna, C., Srinivasulu, P., Kiran, M.: Dynamic audit service outsourcing for data integrity in clouds. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(2), 2482–2486 (2013)Google Scholar
  12. 12.
    Nandini, J., Sugapriya, N.P., Vinmathi, M.S.: Secure multi-owner data storage with enhanced TPA auditing scheme in cloud computing. Int. J. Adv. Comput. Sci. Cloud Comput. 2, 2321–4058 (2014)Google Scholar
  13. 13.
    Poornima, S.N., Ponmagal, R.S.: Secure preserving public auditing for regenerating code based on cloud storage. Networking Commun. Eng. 8(5), 200–204 (2016)Google Scholar
  14. 14.
    Rinku, D.R., Rani, M.A.: Analysis of multi-threading time metric on single and multi-core CPUs with Matrix Multiplication. In: 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 152–155. IEEE (2017)Google Scholar
  15. 15.
    Rizvi, S., Razaque, A., Cover, K.: Cloud data integrity using a designated public verifier. In: High Performance Computing and Communications (HPCC). 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on, pp. 1361–1366. IEEE (2015)Google Scholar
  16. 16.
    Ryoo, J., Rizvi, S., Aiken, W., Kissell, J.: Cloud security auditing: challenges and emerging approaches. IEEE Secur. Priv. 12(6), 68–74 (2014)CrossRefGoogle Scholar
  17. 17.
    Shirahatti, A.P., Khanagoudar, P.S.: Preserving integrity of data and public auditing for data storage security in cloud computing. Int. Mag. Adv. Comput. Sci. Telecommun. 3(3), 161 (2012)Google Scholar
  18. 18.
    Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. (2015)Google Scholar
  19. 19.
    Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Infocom, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010)Google Scholar
  21. 21.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar
  22. 22.
    Wu, Y., Jiang, Z.L., Wang, X., Yiu, S.M., Zhang, P.: Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 562–567 (2017)Google Scholar
  23. 23.
    Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)CrossRefGoogle Scholar
  24. 24.
    Zhang, H., Tu, T.: Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. IEEE Trans. Serv. Comput. (2017)Google Scholar
  25. 25.
    Zhu, Y., Ahn, G.J., Hu, H., Yau, S.S., An, H.G., Hu, C.J.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)CrossRefGoogle Scholar
  26. 26.
    Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Deepak Kumar Verma
    • 1
    Email author
  • Purnima Gupta
    • 1
  • Rajesh Kumar Tyagi
    • 2
  1. 1.IEC College of Engineering and TechnologyGreater NoidaIndia
  2. 2.Krishna Institute of Engineering and TechnologyGhaziabadIndia

Personalised recommendations