Abstract
Cloud computing enables the users to outsource and access data economically from the distributed cloud server. Cloud provider offers data storage as a service and share the data across multiple authorized users in a cost-effective manner. In the cloud-computing model, once the data leaves the owner premises, there is no control of data to the data owner. To provide security for the outsources, data is one of the challenging tasks in cloud computing. Public auditing of outsourced data to verify the integrity of the data provides the data security. In this paper, we proposed a multisector public auditing system by utilizing a linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads by utilizing linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads.
References
Rivest, R. L. and Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
Rivest, R., The md5 message-digest algorithm, 2014.
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu, Dynamic audit services for outsourced storages in clouds, in IEEE TRANSACTIONS ON SERVICES COMPUTING, vol. 6, pp. 227–238, April-June 2013.
Jiang Deng, Chunxiang Xu, Huai Wu and Liju Dong, A new certificateless signature with enhanced security and aggregation version, Concurrency and Computation: Practice and Experience, vol. 28, no. 4, pp. 1124–1133, 2016.
Tao Jiang, Xiaofeng Chen, and Jianfeng Ma, Public integrity auditing for shared dynamic cloud data with group user revocation, in IEEE Transactions on Computers, 2015.
Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, Privacy-preserving public auditing for secure cloud storage, in IEEE Transactions on Computers, vol. 22, no. 2, 2013.
Jiawei Yuan; Shucheng Yu, Public integrity auditing for dynamic data sharing with multiuser modification, IEEE Transactions on Services Computing, vol. 10, pp. 1717–1726, 2015.
Hui Tian; Yuxiang Chen; Chin-Chen Chang; Hong Jiang; Yongfeng Huang; Yonghong Chen; Jin Liu, Dynamic-hash-table based public auditing for secure cloud storage, IEEE Transactions on Services Computing, vol. 99, 2016.
Juels, Ari and Kaliski, Jr., Burton S., Pors: Proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 07, pp. 584–597, ACM, 2007.
Ateniese, Giuseppe and Burns, Randal and Curtmola, Reza and Herring, Joseph and Kissner, Lea and Peterson, Zachary and Song, Dawn, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 07, pp. 598–609, ACM, 2007.
Erway, C. Chris and Kupc u, Alptekin and Papamanthou, Charalampos and Tamassia, Roberto, Dynamic provable data possession, ACM Trans. Inf. Syst. Secur., vol. 17, no. 4, 2015.
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, Enabling public auditability and data dynamics for storage security in cloud computing, in IEEE Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS09), 2009.
Boyang Wang; Hui Li; Xuefeng Liu; Fenghua Li; Xiaoqing Li, Efficient public verification on the integrity of multi-owner data in the cloud, Journal of Communications and Networks, vol. 16, no. 6, pp. 592–599, 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prakash, G.L., Prateek, M., Singh, I. (2018). Secure Public Auditing Using Batch Processing for Cloud Data Storage. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol 79. Springer, Singapore. https://doi.org/10.1007/978-981-10-5828-8_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-5828-8_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5827-1
Online ISBN: 978-981-10-5828-8
eBook Packages: EngineeringEngineering (R0)