Skip to main content

An Overview on Privacy Preservation and Public Auditing on Outsourced Cloud Data

  • Conference paper
  • First Online:
Smart Trends in Computing and Communications

Abstract

Privacy preservation is the process of providing the solution for maintaining safety of outsourced data in cloud and the integrity of the outsourced data is checked with the help of public auditing. Outsourced cloud data offers big relief in terms of data storage in local machine, and security related to outsourced data is an important issue in the field of data management. This paper discusses the available encryption techniques to ensure privacy for a particular level in cloud. Based on the study of various literatures, no privacy preservation system is completely available in the present situation. The performance of available systems is evaluated based on security characteristics, that is, privacy, low computation cost, key exchange and management and so on. Still, there is a scope of improvement in designing a system to secure outsourced data storage with the help of privacy preservation and public auditing in terms of huge computation required to ensure integrity of data storage and reducing auditing time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, B., Curtmola, R., Ateniese, G., Burns, R.: Remote data checking for network coding-based distributed storage systems. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 31–42 (2010)

    Google Scholar 

  2. Chen, H., Lee, P.: Enabling data integrity protection in regenerating coding- based cloud storage: Theory and implementation. IEEE Trans. Parallel Distrib. Syst. 25(2), 407–416 (2014)

    Article  Google Scholar 

  3. Dimakis, A.G., Ramchandran, K., Wu, Y., Suh, C.: A survey on network codes for distributed storage. Proc. IEEE 99(3), 476–489 (2011)

    Article  Google Scholar 

  4. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Advances in Cryptology-ASIACRYPT 2008, pp. 90– 107. Springer, Berlin (2008)

    Chapter  Google Scholar 

  5. Hu, Y., Chen, H.C., Lee, P.P., Tang, Y.: Nccloud: applying network coding for the storage repair in a cloud-of-clouds. In: USENIX FAST (2012)

    Google Scholar 

  6. Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597. ACM (2007)

    Google Scholar 

  7. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS’07, pp. 598– 609. ACM, New York, USA (2007)

    Google Scholar 

  8. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)

    Article  Google Scholar 

  9. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, pp. 1–9. INFOCOM, IEEE (2010)

    Google Scholar 

  10. Wang, C., Wang, Q., Ren, K., Lou, W.: Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)

    Article  Google Scholar 

  11. Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I.: Above the clouds: a Berkeley view of cloud computing. In: Department of Electrical Engeering and Computer Sciences, University of California, Berkeley, Rep. UCB/EECS, vol. 28, p. 13 (2009)

    Google Scholar 

  12. Curtmola, R., Khan, O., Burns, R., Ateniese, G.: Mr-pdp: multiple replica provable data possession. In: 28th International Conference on Distributed Computing Systems, ICDCS’08, pp. 411–420. IEEE (2008)

    Google Scholar 

  13. Bowers, K.D., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: 16th ACM Conference on Computer and Communications Security, pp. 187–198. ACM (2009)

    Google Scholar 

  14. He, J., Zhang, Y., Huang, G., Shi, Y., Cao, J.: Distributed data possession checking for securing multiple replicas in geographically dispersed clouds. J. Comput. Syst. Sci. 78(5), 1345–1358 (2012)

    Article  Google Scholar 

  15. Zhu, Y., Hu, H., Ahn, G.-J., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)

    Article  Google Scholar 

  16. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2),. 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  17. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cyptology 17(4), 297–319 (2004)

    MathSciNet  MATH  Google Scholar 

  18. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Advances in Cryptology CRYPTO 2001, pp. 213–229. Springer, Berlin (2001)

    Chapter  Google Scholar 

  19. Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539–4551 (2010)

    Article  Google Scholar 

  20. Ho, T., Medard, M., Koetter, R., Karger, D.R., Effros, M., Shi, J., Leong, B.: A random linear network coding approach to multicast. IEEE Trans. Inform. Theory 52(10), 4413–4430 (2006)

    Article  MathSciNet  Google Scholar 

  21. Boneh, D., Freeman, D., Katz, J., Waters, B.: Signing a linear subspace: signature schemes for network coding. In: Public Key Cryptography–PKC 2009, pp. 68–87. Springer, Berlin (2009)

    Chapter  Google Scholar 

  22. Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Public Key Cryptography–PKC 2010, pp. 142–160. Springer, Berlin (2010)

    Chapter  Google Scholar 

  23. Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. ICICE Trans. Fundam. Electron. Commun. Comput. Sci. 84(5), 1234–1243 (2001)

    MATH  Google Scholar 

  24. Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen message attacks. SIAM J. Comput. 17(2), 281–308 (1988)

    Article  MathSciNet  Google Scholar 

  25. Worku, S.G., Xu, C., Zhao, J., He, X.: Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40(5), 1703–1713 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonali D. Khambalkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khambalkar, S.D., Kamble, S.D., Thakur, N.V., Sambhe, N.U., Mangrulkar, N.S. (2020). An Overview on Privacy Preservation and Public Auditing on Outsourced Cloud Data. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_47

Download citation

Publish with us

Policies and ethics