Skip to main content

Cloud Storage–Optimization of Initial Phase for Privacy-Preserving Public Auditing

  • Conference paper
  • First Online:
Ambient Communications and Computer Systems

Abstract

The integrity of data confirms that an unapproved user cannot temper the outsourced data in cloud storage. The cloud storage needs to be secure from unapproved tempering. For integrity verification process, data owner generates the signature which is sent to the third-party auditor. It is a one-time process, but it increases the overhead of the data owner. We have analyzed the existing data integrity auditing schemes along with their distinctions. The proposed system supports privacy-preserving integrity auditing by using homomorphic linear authentication and employing Boneh–Lynn–Shacham-based signature technique. We extend our research to enable the data owner to speed up the initial phase through detailed experiments and comparisons between single-thread and multi-thread models using different core of CPUs. The proposed scheme demonstrated by using multithreading architecture on multi-core CPU for getting better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598–609 (2007)

    Google Scholar 

  2. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, p. 9 (2008)

    Google Scholar 

  3. Chen, K.Y., Chang, J.M., Hou, T.W.: Multithreading in Java: performance and scalability on multicore systems. IEEE Trans. Comput. 60(11), 1521–1534 (2011)

    Article  MathSciNet  Google Scholar 

  4. Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data (2017)

    Google Scholar 

  5. Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of 18th International Conference on Data Engineering, pp. 29–38 IEEE (2002)

    Google Scholar 

  6. Kaustubh, S., Jog, V.V.: Article: A Survey on Integrity Checking for Outsourced Data in Cloud using TPA. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(1), 6–9 (2016)

    Google Scholar 

  7. Kumar, N.S., Lakshmi, G.R., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015)

    Article  Google Scholar 

  8. Lin, L., Liu, T., Hu, J., Ni, J.: PQsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intell. 3(3), 202–214 (2016)

    Article  Google Scholar 

  9. Li, Y., Yu, Y., Min, G., Susilo, W., Ni, J., Choo, K.K.R.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. (2017)

    Google Scholar 

  10. Mell, P., Grance, T.: The NIST definition of cloud computing. Nat. Inst. Stand. Technol. 53(6), 50 (2009)

    Google Scholar 

  11. Mutyalanna, C., Srinivasulu, P., Kiran, M.: Dynamic audit service outsourcing for data integrity in clouds. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 1(2), 2482–2486 (2013)

    Google Scholar 

  12. Nandini, J., Sugapriya, N.P., Vinmathi, M.S.: Secure multi-owner data storage with enhanced TPA auditing scheme in cloud computing. Int. J. Adv. Comput. Sci. Cloud Comput. 2, 2321–4058 (2014)

    Google Scholar 

  13. Poornima, S.N., Ponmagal, R.S.: Secure preserving public auditing for regenerating code based on cloud storage. Networking Commun. Eng. 8(5), 200–204 (2016)

    Google Scholar 

  14. Rinku, D.R., Rani, M.A.: Analysis of multi-threading time metric on single and multi-core CPUs with Matrix Multiplication. In: 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 152–155. IEEE (2017)

    Google Scholar 

  15. Rizvi, S., Razaque, A., Cover, K.: Cloud data integrity using a designated public verifier. In: High Performance Computing and Communications (HPCC). 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conference on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on, pp. 1361–1366. IEEE (2015)

    Google Scholar 

  16. Ryoo, J., Rizvi, S., Aiken, W., Kissell, J.: Cloud security auditing: challenges and emerging approaches. IEEE Secur. Priv. 12(6), 68–74 (2014)

    Article  Google Scholar 

  17. Shirahatti, A.P., Khanagoudar, P.S.: Preserving integrity of data and public auditing for data storage security in cloud computing. Int. Mag. Adv. Comput. Sci. Telecommun. 3(3), 161 (2012)

    Google Scholar 

  18. Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. (2015)

    Google Scholar 

  19. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  20. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Infocom, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010)

    Google Scholar 

  21. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  22. Wu, Y., Jiang, Z.L., Wang, X., Yiu, S.M., Zhang, P.: Dynamic data operations with deduplication in privacy-preserving public auditing for secure cloud storage. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 562–567 (2017)

    Google Scholar 

  23. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)

    Article  Google Scholar 

  24. Zhang, H., Tu, T.: Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree. IEEE Trans. Serv. Comput. (2017)

    Google Scholar 

  25. Zhu, Y., Ahn, G.J., Hu, H., Yau, S.S., An, H.G., Hu, C.J.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)

    Article  Google Scholar 

  26. Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Kumar Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Verma, D.K., Gupta, P., Tyagi, R.K. (2019). Cloud Storage–Optimization of Initial Phase for Privacy-Preserving Public Auditing. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5934-7_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5933-0

  • Online ISBN: 978-981-13-5934-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics