Skip to main content

Assessment of Integrity Auditing Protocols for Outsourced Big Data

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 695))

Abstract

Due to overwhelming advancement in sensor networks and communication technology, Internet of Things is taking shape to help make our lives smarter. Devices working on Internet of Things are responsible for generating multifarious and mammoth data. In addition to this, academia, business firms, etc., add vast amount of data to the pool of storage systems. This data are big data. Cloud computing provides paramount solution to store and process this big data through database outsourcing, thus reducing capital expenditure and operational costs. As big data are hosted by third party service providers in the cloud, security of such data becomes one of the significant concerns of data owners. The untrustworthy nature of service providers does not guarantee the security of data and computation results. This necessitates the owners to audit the integrity of data. Therefore, integrity auditing becomes the part and parcel of outsourced big data. Maintaining confidentiality, privacy, and trust for such big data are sine qua non for seamless and secure execution of big data-related applications. This paper gives a thorough analysis of integrity auditing protocols applied for big data residing in cloud environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Digital universe, https://www.emc.com/leadership/digital-universe/2014iview/executive-summary.htm

  2. Pathak, A.R., Padmavathi, B.: A secure threshold secret sharing framework for database outsourcing. In: IEEE International Conference on Advanced Communications, Control and Computing Technologies, pp. 1642–1649 (2014)

    Google Scholar 

  3. Miller, R.: Amazon addresses EC2 power outages. Data Center Knowledge 1 (2010)

    Google Scholar 

  4. Pathak, A.R., Padmavathi, B.: Survey of confidentiality and integrity in outsourced databases. Int. J. Sci. Eng. Technol. 2(3), 122–128 (2013)

    Google Scholar 

  5. Pathak, A.R., Padmavathi, B.: Analysis of security techniques applied in database outsourcing. Int. J. Comput. Sci. IT 5(1), 665–670 (2014)

    Google Scholar 

  6. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM CCS, pp. 598–609 (2007)

    Google Scholar 

  7. Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)

    Google Scholar 

  8. Shacham, H., Waters,B.: Compact proofs of retrievability. In: 14th International Conference on Theory and Application of Cryptology and Information Security, pp. 90–107 (2008)

    Chapter  Google Scholar 

  9. Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)

    Article  Google Scholar 

  10. Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)

    Article  Google Scholar 

  11. Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 13(9) (2014)

    Google Scholar 

  12. Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4) (2015)

    Google Scholar 

  13. Esiner, E., et al.: FlexDPDP: flexlist-based optimized dynamic provable data possession. ACM Trans. Storage 12(4) (2016)

    Article  Google Scholar 

  14. Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, F.: OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3(2), 195–205 (2015)

    Article  Google Scholar 

  15. Li, J., Zhang, L., Liu, J. K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11) 2572–2583 (2016)

    Article  Google Scholar 

  16. Wang, Y., et al.: Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans. Inf. Forensics Secur. 12(4), 940–952 (2017)

    Article  Google Scholar 

  17. Zhang, Y., Blanton, M.: Efficient dynamic provable possession of remote data via update trees. ACM Trans. Storage 12(2) (2016) (Article 9)

    Article  Google Scholar 

  18. Jiang, T., et al.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)

    Article  MathSciNet  Google Scholar 

  19. Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data (2017)

    Google Scholar 

  20. Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. J. Cryptol. 30(1), 22–57 (2017)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajeet Ram Pathak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pathak, A.R., Pandey, M., Rautaray, S. (2018). Assessment of Integrity Auditing Protocols for Outsourced Big Data. In: Bhateja, V., Coello Coello, C., Satapathy, S., Pattnaik, P. (eds) Intelligent Engineering Informatics. Advances in Intelligent Systems and Computing, vol 695. Springer, Singapore. https://doi.org/10.1007/978-981-10-7566-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7566-7_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7565-0

  • Online ISBN: 978-981-10-7566-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics