Skip to main content

Secure Public Auditing Using Batch Processing for Cloud Data Storage

  • Conference paper
  • First Online:
Proceedings of First International Conference on Smart System, Innovations and Computing

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 79))

Abstract

Cloud computing enables the users to outsource and access data economically from the distributed cloud server. Cloud provider offers data storage as a service and share the data across multiple authorized users in a cost-effective manner. In the cloud-computing model, once the data leaves the owner premises, there is no control of data to the data owner. To provide security for the outsources, data is one of the challenging tasks in cloud computing. Public auditing of outsourced data to verify the integrity of the data provides the data security. In this paper, we proposed a multisector public auditing system by utilizing a linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads by utilizing linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Rivest, R. L. and Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.

    Google Scholar 

  2. Rivest, R., The md5 message-digest algorithm, 2014.

    Google Scholar 

  3. Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu, Dynamic audit services for outsourced storages in clouds, in IEEE TRANSACTIONS ON SERVICES COMPUTING, vol. 6, pp. 227–238, April-June 2013.

    Google Scholar 

  4. Jiang Deng, Chunxiang Xu, Huai Wu and Liju Dong, A new certificateless signature with enhanced security and aggregation version, Concurrency and Computation: Practice and Experience, vol. 28, no. 4, pp. 1124–1133, 2016.

    Google Scholar 

  5. Tao Jiang, Xiaofeng Chen, and Jianfeng Ma, Public integrity auditing for shared dynamic cloud data with group user revocation, in IEEE Transactions on Computers, 2015.

    Google Scholar 

  6. Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, Privacy-preserving public auditing for secure cloud storage, in IEEE Transactions on Computers, vol. 22, no. 2, 2013.

    Google Scholar 

  7. Jiawei Yuan; Shucheng Yu, Public integrity auditing for dynamic data sharing with multiuser modification, IEEE Transactions on Services Computing, vol. 10, pp. 1717–1726, 2015.

    Google Scholar 

  8. Hui Tian; Yuxiang Chen; Chin-Chen Chang; Hong Jiang; Yongfeng Huang; Yonghong Chen; Jin Liu, Dynamic-hash-table based public auditing for secure cloud storage, IEEE Transactions on Services Computing, vol. 99, 2016.

    Google Scholar 

  9. Juels, Ari and Kaliski, Jr., Burton S., Pors: Proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 07, pp. 584–597, ACM, 2007.

    Google Scholar 

  10. Ateniese, Giuseppe and Burns, Randal and Curtmola, Reza and Herring, Joseph and Kissner, Lea and Peterson, Zachary and Song, Dawn, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 07, pp. 598–609, ACM, 2007.

    Google Scholar 

  11. Erway, C. Chris and Kupc u, Alptekin and Papamanthou, Charalampos and Tamassia, Roberto, Dynamic provable data possession, ACM Trans. Inf. Syst. Secur., vol. 17, no. 4, 2015.

    Google Scholar 

  12. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, Enabling public auditability and data dynamics for storage security in cloud computing, in IEEE Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS09), 2009.

    Google Scholar 

  13. Boyang Wang; Hui Li; Xuefeng Liu; Fenghua Li; Xiaoqing Li, Efficient public verification on the integrity of multi-owner data in the cloud, Journal of Communications and Networks, vol. 16, no. 6, pp. 592–599, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. L. Prakash .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prakash, G.L., Prateek, M., Singh, I. (2018). Secure Public Auditing Using Batch Processing for Cloud Data Storage. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol 79. Springer, Singapore. https://doi.org/10.1007/978-981-10-5828-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5828-8_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5827-1

  • Online ISBN: 978-981-10-5828-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics