Assessment of Integrity Auditing Protocols for Outsourced Big Data

  • Ajeet Ram Pathak
  • Manjusha Pandey
  • Siddharth Rautaray
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 695)


Due to overwhelming advancement in sensor networks and communication technology, Internet of Things is taking shape to help make our lives smarter. Devices working on Internet of Things are responsible for generating multifarious and mammoth data. In addition to this, academia, business firms, etc., add vast amount of data to the pool of storage systems. This data are big data. Cloud computing provides paramount solution to store and process this big data through database outsourcing, thus reducing capital expenditure and operational costs. As big data are hosted by third party service providers in the cloud, security of such data becomes one of the significant concerns of data owners. The untrustworthy nature of service providers does not guarantee the security of data and computation results. This necessitates the owners to audit the integrity of data. Therefore, integrity auditing becomes the part and parcel of outsourced big data. Maintaining confidentiality, privacy, and trust for such big data are sine qua non for seamless and secure execution of big data-related applications. This paper gives a thorough analysis of integrity auditing protocols applied for big data residing in cloud environment.


Big data Database outsourcing Third party auditing Provable data possession Integrity auditing Proof of retrievability 


  1. 1.
  2. 2.
    Pathak, A.R., Padmavathi, B.: A secure threshold secret sharing framework for database outsourcing. In: IEEE International Conference on Advanced Communications, Control and Computing Technologies, pp. 1642–1649 (2014)Google Scholar
  3. 3.
    Miller, R.: Amazon addresses EC2 power outages. Data Center Knowledge 1 (2010)Google Scholar
  4. 4.
    Pathak, A.R., Padmavathi, B.: Survey of confidentiality and integrity in outsourced databases. Int. J. Sci. Eng. Technol. 2(3), 122–128 (2013)Google Scholar
  5. 5.
    Pathak, A.R., Padmavathi, B.: Analysis of security techniques applied in database outsourcing. Int. J. Comput. Sci. IT 5(1), 665–670 (2014)Google Scholar
  6. 6.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM CCS, pp. 598–609 (2007)Google Scholar
  7. 7.
    Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)Google Scholar
  8. 8.
    Shacham, H., Waters,B.: Compact proofs of retrievability. In: 14th International Conference on Theory and Application of Cryptology and Information Security, pp. 90–107 (2008)CrossRefGoogle Scholar
  9. 9.
    Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)CrossRefGoogle Scholar
  10. 10.
    Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)CrossRefGoogle Scholar
  11. 11.
    Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 13(9) (2014)Google Scholar
  12. 12.
    Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4) (2015)Google Scholar
  13. 13.
    Esiner, E., et al.: FlexDPDP: flexlist-based optimized dynamic provable data possession. ACM Trans. Storage 12(4) (2016)CrossRefGoogle Scholar
  14. 14.
    Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, F.: OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3(2), 195–205 (2015)CrossRefGoogle Scholar
  15. 15.
    Li, J., Zhang, L., Liu, J. K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11) 2572–2583 (2016)CrossRefGoogle Scholar
  16. 16.
    Wang, Y., et al.: Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans. Inf. Forensics Secur. 12(4), 940–952 (2017)CrossRefGoogle Scholar
  17. 17.
    Zhang, Y., Blanton, M.: Efficient dynamic provable possession of remote data via update trees. ACM Trans. Storage 12(2) (2016) (Article 9)CrossRefGoogle Scholar
  18. 18.
    Jiang, T., et al.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data (2017)Google Scholar
  20. 20.
    Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. J. Cryptol. 30(1), 22–57 (2017)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Ajeet Ram Pathak
    • 1
  • Manjusha Pandey
    • 1
  • Siddharth Rautaray
    • 1
  1. 1.School of Computer EngineeringKalinga Institute of Industrial Technology University, (KIIT)BhubaneswarIndia

Personalised recommendations