Abstract
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch auditing to save resources in the auditor side, the design of methods to locate the specific positions of the corrupted data blocks is ignored. In this paper, we propose a novel batch auditing protocol based on the Fibonacci sequence to save resources in the cloud, which is an extension of our previous work. Experimental results and numerical analysis indicate that the proposed scheme is efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 50 (2011)
Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web Internet Web Inf. Syst. 15(4), 409–428 (2011)
Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)
Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)
Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)
Khorshed, M.T., Ali, A.B.M.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)
Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002–4012 (2016)
Soares, L.F.B., Fernandes, D.A.B., Gomes, J.V., Freire, M.M., Inácio, P.R.M.: Cloud security: state of the art. In: Nepal, S., Pathan, M. (eds.) Security, Privacy and Trust in Cloud Systems. Springer, Heidelberg (2014). doi:10.1007/978-3-642-38586-5_1
Fu, Z., Huang, F., Sun, X., Vasilakos, A.V., Yang, C.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. (2017). doi:10.1109/TSC.2016.2622697
Chen, B., Shu, H., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.: Color image analysis by quaternion-type moments. J. Math. Imaging Vis. 51(1), 124–144 (2015)
Sebé, F., Domingoferrer, J., Martnezballest, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)
Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 2009(2), 362–375 (2013)
Worku, S.G., Xu, C., Zhao, J., He, X.: Secure and efficient privacy-preserving public auditing scheme for cloud storage ☆. Comput. Electr. Eng. 40(5), 1703–1713 (2014)
Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)
Yu, J., Ren, K., Wang, C.: Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans. Inf. Forensics Secur. 11(6), 1362–1375 (2016)
Erway, C.C., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4), 213–222 (2009)
Kong, Y., Zhang, M., Ye, D.: A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl. Based Syst. 115, 123–132 (2016)
Shen, J., Liu, D., Shen, J., Liu, Q., Sun, X.: A secure cloud-assisted urban data sharing framework for ubiquitous-cities. Perv. Mobile Comput. (2017). doi:10.1016/j.pmcj
Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. (2016). doi:10.1109/TCC.2016.2525998
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, vol. 14, pp. 598–609 (2007)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: The 4th International Conference on Security and Privacy in Communication Networks, pp. 1–10 (2008)
Acknowledgements
This work is supported by the National Science Foundation of China under Grant No. 61672295, No. 61300237 and No. U1405254, the State Key Laboratory of Information Security under Grant No. 2017-MS-10, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Shen, J., Shen, J., Wang, C., Wang, A. (2017). A Fibonacci Based Batch Auditing Protocol for Cloud Data. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-69471-9_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69470-2
Online ISBN: 978-3-319-69471-9
eBook Packages: Computer ScienceComputer Science (R0)