Abstract
With the huge development in cloud computing services, cloud storage becomes an important service for individuals and organization, with the capabilities of on-demand outsourcing application. After outsourcing the data, owner has no physical control over remotely present data. To verify the data integrity, several efficient cryptographic techniques related to provable data possession (PDP) were proposed to check the remote data integrity without downloading it from the cloud storage server. In this paper, with the knowledge of interactive PDP protocol, we propose an efficient public auditing method based on probabilistic queries and periodic verification to improve the performance of audit service. The method reduces the leakage of the data by public auditing and reduces the computational and communication cost of audit services by selecting the secured parameter. Our experimental result shows it incurs less communication cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering 25(6):599–616
Yu Y, Au MHA, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur
Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) SCLPV: secure certificateless public verification for cloud-based cyber-physicalsocial systems against malicious auditors. IEEE Trans Comput Soc Syst 2(4):159–170
Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM conference on computer and communications security. ACM, New York, NY, USA, pp 187–198
Abo-Alian A, Badr NL, Tolba MF (2016) Integrity verification for dynamic multi-replica data in cloud storage. Asian J Inf Technol 15(6):1056–1072
Abo-alian A, Badr NL, Tolba MF (2015) Auditing-as-a-Service for cloud storage. In: Intelligent systems 2014. Springer International Publishing, pp 559–568
Wang C, Chow SS, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375 (2013)
Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69–73
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, NY, USA, pp 598–609
Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106
Chen F, Xiang T, Yang Y, Chow SSM (2016) Secure cloud storage meets with secure network coding. IEEE Trans Comput 65(6):1936–1948
Wang Y, Wu Q, Qin B, Chen X, Huang X, Lou J (2016) Ownership-hidden group-oriented proofs of storage from prehomomorphic signatures. Peer-to-Peer Netw Appl 1–17
Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Wang H (2013) Proxy provable data possession in public clouds. IEEE Trans Serv Comput 6(4):551–559
Shen S-T, Tzeng W-G (2011) Delegable provable data possession for remote data in the clouds. In: Qing S, Susilo W, Wang G, Liu D (eds) Information and communications security, ser. LNCS. Springer, Berlin, Heidelberg, vol 7043, pp 93–111
Jiang T, Chen X, Ma J (2016) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373
Fan X, Yang G, Mu Y, Yu Y (2015) On indistinguishability in remote data integrity checking. Comput J 58(4):823–830
Yu Y, Au MH, Mu Y, Tang S, Ren J, Susilo W, Dong L (2015) Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int J Inf Secur 14(4):307–318
Zhang J, Dong Q (2016) Efficient id-based public auditing for the outsourced data in cloud storage. Inf Sci 343344:1–14
Juels A, Kaliski BS Jr (2007) PoRs: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security, New York, NY, USA, pp 584–597
Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Arjun, U., Vinay, S. (2019). An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud. In: Sridhar, V., Padma, M., Rao, K. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-13-5802-9_27
Download citation
DOI: https://doi.org/10.1007/978-981-13-5802-9_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5801-2
Online ISBN: 978-981-13-5802-9
eBook Packages: EngineeringEngineering (R0)