Abstract
The integrity of data confirms that an unapproved user cannot temper the outsourced data in cloud storage. The cloud storage needs to be secure from unapproved tempering. For integrity verification process, data owner generates the signature which is sent to the third-party auditor. It is a one-time process, but it increases the overhead of the data owner. We have analyzed the existing data integrity auditing schemes along with their distinctions. The proposed system supports privacy-preserving integrity auditing by using homomorphic linear authentication and employing Boneh–Lynn–Shacham-based signature technique. We extend our research to enable the data owner to speed up the initial phase through detailed experiments and comparisons between single-thread and multi-thread models using different core of CPUs. The proposed scheme demonstrated by using multithreading architecture on multi-core CPU for getting better performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598–609 (2007)
Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 9 (2008)
Chen, K.Y., Chang, J.M., Hou, T.W.: Multithreading in Java: performance and scalability on multicore systems. IEEE Trans. Comput. 60(11), 1521–1534 (2011)
Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data (2017)
Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of 18th International Conference on Data Engineering, pp. 29–38 IEEE (2002)
Kaustubh, S., Jog, V.V.: Article: A Survey on Integrity Checking for Outsourced Data in Cloud using TPA. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(1), 6–9 (2016)
Kumar, N.S., Lakshmi, G.R., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015)
Lin, L., Liu, T., Hu, J., Ni, J.: PQsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intell. 3(3), 202–214 (2016)
Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., Choo, K.K.R.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. (2017)
Mell, P., Grance, T.: The NIST definition of cloud computing. Nat. Inst. Stand. Technol. 53(6), 50 (2009)
Mutyalanna, C., Srinivasulu, P., Kiran, M.: Dynamic audit service outsourcing for data integrity in clouds. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(2), 2482–2486 (2013)
Nandini, J., Sugapriya, N.P., Vinmathi, M.S.: Secure multi-owner data storage with enhanced TPA auditing scheme in cloud computing. Int. J. Adv. Comput. Sci. Cloud Comput. 2, 2321–4058 (2014)
Poornima, S.N., Ponmagal, R.S.: Secure preserving public auditing for regenerating code based on cloud storage. Networking Commun. Eng. 8(5), 200–204 (2016)
Rinku, D.R., Rani, M.A.: Analysis of multi-threading time metric on single and multi-core CPUs with Matrix Multiplication. In: 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 152–155. IEEE (2017)
Rizvi, S., Razaque, A., Cover, K.: Cloud data integrity using a designated public verifier. In: High Performance Computing and Communications (HPCC). 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on, pp. 1361–1366. IEEE (2015)
Ryoo, J., Rizvi, S., Aiken, W., Kissell, J.: Cloud security auditing: challenges and emerging approaches. IEEE Secur. Priv. 12(6), 68–74 (2014)
Shirahatti, A.P., Khanagoudar, P.S.: Preserving integrity of data and public auditing for data storage security in cloud computing. Int. Mag. Adv. Comput. Sci. Telecommun. 3(3), 161 (2012)
Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. (2015)
Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Infocom, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Wu, Y., Jiang, Z.L., Wang, X., Yiu, S.M., Zhang, P.: Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 562–567 (2017)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
Zhang, H., Tu, T.: Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. IEEE Trans. Serv. Comput. (2017)
Zhu, Y., Ahn, G.J., Hu, H., Yau, S.S., An, H.G., Hu, C.J.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)
Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Verma, D.K., Gupta, P., Tyagi, R.K. (2019). Cloud Storage–Optimization of Initial Phase for Privacy-Preserving Public Auditing. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_32
Download citation
DOI: https://doi.org/10.1007/978-981-13-5934-7_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5933-0
Online ISBN: 978-981-13-5934-7
eBook Packages: EngineeringEngineering (R0)