Abstract
Due to overwhelming advancement in sensor networks and communication technology, Internet of Things is taking shape to help make our lives smarter. Devices working on Internet of Things are responsible for generating multifarious and mammoth data. In addition to this, academia, business firms, etc., add vast amount of data to the pool of storage systems. This data are big data. Cloud computing provides paramount solution to store and process this big data through database outsourcing, thus reducing capital expenditure and operational costs. As big data are hosted by third party service providers in the cloud, security of such data becomes one of the significant concerns of data owners. The untrustworthy nature of service providers does not guarantee the security of data and computation results. This necessitates the owners to audit the integrity of data. Therefore, integrity auditing becomes the part and parcel of outsourced big data. Maintaining confidentiality, privacy, and trust for such big data are sine qua non for seamless and secure execution of big data-related applications. This paper gives a thorough analysis of integrity auditing protocols applied for big data residing in cloud environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Digital universe, https://www.emc.com/leadership/digital-universe/2014iview/executive-summary.htm
Pathak, A.R., Padmavathi, B.: A secure threshold secret sharing framework for database outsourcing. In: IEEE International Conference on Advanced Communications, Control and Computing Technologies, pp. 1642–1649 (2014)
Miller, R.: Amazon addresses EC2 power outages. Data Center Knowledge 1 (2010)
Pathak, A.R., Padmavathi, B.: Survey of confidentiality and integrity in outsourced databases. Int. J. Sci. Eng. Technol. 2(3), 122–128 (2013)
Pathak, A.R., Padmavathi, B.: Analysis of security techniques applied in database outsourcing. Int. J. Comput. Sci. IT 5(1), 665–670 (2014)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM CCS, pp. 598–609 (2007)
Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)
Shacham, H., Waters,B.: Compact proofs of retrievability. In: 14th International Conference on Theory and Application of Cryptology and Information Security, pp. 90–107 (2008)
Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)
Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Trans. Serv. Comput. 8(2), 328–340 (2015)
Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 13(9) (2014)
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17(4) (2015)
Esiner, E., et al.: FlexDPDP: flexlist-based optimized dynamic provable data possession. ACM Trans. Storage 12(4) (2016)
Li, J., Tan, X., Chen, X., Wong, D.S., Xhafa, F.: OPoR: enabling proof of retrievability in cloud computing with resource-constrained devices. IEEE Trans. Cloud Comput. 3(2), 195–205 (2015)
Li, J., Zhang, L., Liu, J. K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11) 2572–2583 (2016)
Wang, Y., et al.: Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans. Inf. Forensics Secur. 12(4), 940–952 (2017)
Zhang, Y., Blanton, M.: Efficient dynamic provable possession of remote data via update trees. ACM Trans. Storage 12(2) (2016) (Article 9)
Jiang, T., et al.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2016)
Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data (2017)
Cash, D., Küpçü, A., Wichs, D.: Dynamic proofs of retrievability via oblivious RAM. J. Cryptol. 30(1), 22–57 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pathak, A.R., Pandey, M., Rautaray, S. (2018). Assessment of Integrity Auditing Protocols for Outsourced Big Data. In: Bhateja, V., Coello Coello, C., Satapathy, S., Pattnaik, P. (eds) Intelligent Engineering Informatics. Advances in Intelligent Systems and Computing, vol 695. Springer, Singapore. https://doi.org/10.1007/978-981-10-7566-7_1
Download citation
DOI: https://doi.org/10.1007/978-981-10-7566-7_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7565-0
Online ISBN: 978-981-10-7566-7
eBook Packages: EngineeringEngineering (R0)