Skip to main content

An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud

  • Conference paper
  • First Online:
Emerging Research in Electronics, Computer Science and Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 545))

  • 2193 Accesses

Abstract

With the huge development in cloud computing services, cloud storage becomes an important service for individuals and organization, with the capabilities of on-demand outsourcing application. After outsourcing the data, owner has no physical control over remotely present data. To verify the data integrity, several efficient cryptographic techniques related to provable data possession (PDP) were proposed to check the remote data integrity without downloading it from the cloud storage server. In this paper, with the knowledge of interactive PDP protocol, we propose an efficient public auditing method based on probabilistic queries and periodic verification to improve the performance of audit service. The method reduces the leakage of the data by public auditing and reduces the computational and communication cost of audit services by selecting the secured parameter. Our experimental result shows it incurs less communication cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering 25(6):599–616

    Google Scholar 

  2. Yu Y, Au MHA, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur

    Google Scholar 

  3. Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) SCLPV: secure certificateless public verification for cloud-based cyber-physicalsocial systems against malicious auditors. IEEE Trans Comput Soc Syst 2(4):159–170

    Article  Google Scholar 

  4. Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM conference on computer and communications security. ACM, New York, NY, USA, pp 187–198

    Google Scholar 

  5. Abo-Alian A, Badr NL, Tolba MF (2016) Integrity verification for dynamic multi-replica data in cloud storage. Asian J Inf Technol 15(6):1056–1072

    Google Scholar 

  6. Abo-alian A, Badr NL, Tolba MF (2015) Auditing-as-a-Service for cloud storage. In: Intelligent systems 2014. Springer International Publishing, pp 559–568

    Google Scholar 

  7. Wang C, Chow SS, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375 (2013)

    Google Scholar 

  8. Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69–73

    Article  MathSciNet  Google Scholar 

  9. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, NY, USA, pp 598–609

    Google Scholar 

  10. Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106

    Article  Google Scholar 

  11. Chen F, Xiang T, Yang Y, Chow SSM (2016) Secure cloud storage meets with secure network coding. IEEE Trans Comput 65(6):1936–1948

    Article  MathSciNet  Google Scholar 

  12. Wang Y, Wu Q, Qin B, Chen X, Huang X, Lou J (2016) Ownership-hidden group-oriented proofs of storage from prehomomorphic signatures. Peer-to-Peer Netw Appl 1–17

    Google Scholar 

  13. Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375

    Google Scholar 

  14. Wang H (2013) Proxy provable data possession in public clouds. IEEE Trans Serv Comput 6(4):551–559

    Article  Google Scholar 

  15. Shen S-T, Tzeng W-G (2011) Delegable provable data possession for remote data in the clouds. In: Qing S, Susilo W, Wang G, Liu D (eds) Information and communications security, ser. LNCS. Springer, Berlin, Heidelberg, vol 7043, pp 93–111

    Google Scholar 

  16. Jiang T, Chen X, Ma J (2016) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373

    Article  MathSciNet  Google Scholar 

  17. Fan X, Yang G, Mu Y, Yu Y (2015) On indistinguishability in remote data integrity checking. Comput J 58(4):823–830

    Article  Google Scholar 

  18. Yu Y, Au MH, Mu Y, Tang S, Ren J, Susilo W, Dong L (2015) Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int J Inf Secur 14(4):307–318

    Article  Google Scholar 

  19. Zhang J, Dong Q (2016) Efficient id-based public auditing for the outsourced data in cloud storage. Inf Sci 343344:1–14

    MathSciNet  Google Scholar 

  20. Juels A, Kaliski BS Jr (2007) PoRs: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security, New York, NY, USA, pp 584–597

    Google Scholar 

  21. Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to U. Arjun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arjun, U., Vinay, S. (2019). An Efficient Public Auditing Method with Periodic Verification for Data Integrity in Cloud. In: Sridhar, V., Padma, M., Rao, K. (eds) Emerging Research in Electronics, Computer Science and Technology. Lecture Notes in Electrical Engineering, vol 545. Springer, Singapore. https://doi.org/10.1007/978-981-13-5802-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5802-9_27

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5801-2

  • Online ISBN: 978-981-13-5802-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics