Skip to main content
Erschienen in: Cluster Computing 2/2019

29.10.2018

A generic approach for integrity verification of big data

verfasst von: Rajat Saxena, Somnath Dey

Erschienen in: Cluster Computing | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data integrity verification is a primary issue for the prominent and unchallenged success of Big Data. The large scale of data includes extra security overheads on customers that used Big Data services. In Big Data environment, many security challenges have pinched out such as data security, malicious insider attack, cyber attack, and abuse of data. In this paper, we have analyzed and identified a novel data integrity verification technique that provides better performance, efficiency, and quick review of Big Data. The milestone of our work are algebraic signature, homomorphic tag, and Combinatorial Batch Codes (CBC). Homomorphic tag delegates a special verifiable value to each data blocks. CBC allocates integral data to store on Big Data servers. This research work used multiple third-party auditors for batch auditing which ensure data integrity in a Big Data environment. Our approach handles single point failure error of single Third Party Auditor (TPA) efficiently. Without using any additional data structure, it supports dynamic data operations. The security and performance analysis with comparative results show the genuine application of our approach within the latest Big Data environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ruj, S., Saxena, R.: Securing cloud data. In: Terzo, O., Mossucca, L. (eds.) Cloud Computing with e-science Applications, pp. 41–72. CRC Press, Boca Raton (2015) Ruj, S., Saxena, R.: Securing cloud data. In: Terzo, O., Mossucca, L. (eds.) Cloud Computing with e-science Applications, pp. 41–72. CRC Press, Boca Raton (2015)
2.
Zurück zum Zitat Saxena, R., Dey, S.: A curious collaborative approach for data integrity verification in cloud computing. CSI Trans. ICT 5, 407–418 (2017)CrossRef Saxena, R., Dey, S.: A curious collaborative approach for data integrity verification in cloud computing. CSI Trans. ICT 5, 407–418 (2017)CrossRef
3.
Zurück zum Zitat Saxena, R., Dey, S.: Collaborative approach for data integrity verification in cloud computing. In: Proceedings of the SNDS, Communications in Computer and Information Science, vol. 420, pp. 1–15. Springer (2014) Saxena, R., Dey, S.: Collaborative approach for data integrity verification in cloud computing. In: Proceedings of the SNDS, Communications in Computer and Information Science, vol. 420, pp. 1–15. Springer (2014)
4.
Zurück zum Zitat Saxena, R., Dey, S.: Cloud audit: a data integrity verification approach for cloud computing. Proc. Comput. Sci. 89, 142–151 (2016)CrossRef Saxena, R., Dey, S.: Cloud audit: a data integrity verification approach for cloud computing. Proc. Comput. Sci. 89, 142–151 (2016)CrossRef
5.
Zurück zum Zitat Shacham, H., Waters, B.: Compact proofs of retrievability. IACR Cryptol. ePrint Arch. 2008, 73 (2008)MATH Shacham, H., Waters, B.: Compact proofs of retrievability. IACR Cryptol. ePrint Arch. 2008, 73 (2008)MATH
6.
Zurück zum Zitat Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 23(12), 2231–2244 (2014)MATH Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 23(12), 2231–2244 (2014)MATH
7.
Zurück zum Zitat Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)CrossRef Zhu, Y., Hu, H., Ahn, G.J., Yu, M.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)CrossRef
8.
Zurück zum Zitat Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 213–222 (2009) Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 213–222 (2009)
9.
Zurück zum Zitat Juels, A., Bowers, K.D., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the ACM Conference on Computer and Communications Security. pp. 187–198 (2009) Juels, A., Bowers, K.D., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the ACM Conference on Computer and Communications Security. pp. 187–198 (2009)
10.
Zurück zum Zitat Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. In: Proceedings of the TCC. pp. 109–127 (2009) Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. In: Proceedings of the TCC. pp. 109–127 (2009)
11.
Zurück zum Zitat Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the Computer Security–ESORICS 2009, pp. 355–370. Springer (2009) Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of the Computer Security–ESORICS 2009, pp. 355–370. Springer (2009)
12.
Zurück zum Zitat Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 43–54. ACM (2009) Bowers, K.D., Juels, A., Oprea, A.: Proofs of retrievability: Theory and implementation. In: Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 43–54. ACM (2009)
13.
Zurück zum Zitat Litwin, W., Schwarz, T.: Algebraic signatures for scalable distributed data structures. In: Proceedings of the 20th International Conference on Data Engineering, 2004, pp. 412–423. IEEE (2004) Litwin, W., Schwarz, T.: Algebraic signatures for scalable distributed data structures. In: Proceedings of the 20th International Conference on Data Engineering, 2004, pp. 412–423. IEEE (2004)
14.
Zurück zum Zitat Schwarz, T.S., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, 2006, pp. 123–129. IEEE (2006) Schwarz, T.S., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, 2006, pp. 123–129. IEEE (2006)
16.
Zurück zum Zitat Bujtás, C., Tuza, Z.: Optimal combinatorial batch codes derived from dual systems. Miskolc Math. Notes 12(1), 11–23 (2011)MathSciNetMATHCrossRef Bujtás, C., Tuza, Z.: Optimal combinatorial batch codes derived from dual systems. Miskolc Math. Notes 12(1), 11–23 (2011)MathSciNetMATHCrossRef
17.
Zurück zum Zitat Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 2231–2244 (1980) Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 2231–2244 (1980)
18.
Zurück zum Zitat Brualdi, R.A., Kiernan, K.P., Meyer, S.A., Schroeder, M.W.: Combinatorial batch codes and transversal matroids. Adv. Math. Commun 4(3), 419–431 (2010)MathSciNetMATHCrossRef Brualdi, R.A., Kiernan, K.P., Meyer, S.A., Schroeder, M.W.: Combinatorial batch codes and transversal matroids. Adv. Math. Commun 4(3), 419–431 (2010)MathSciNetMATHCrossRef
22.
Zurück zum Zitat Chen, L.: Using algebraic signatures to check data possession in cloud storage. Fut. Gener. Comput. Syst. 29(7), 1709–1715 (2013)CrossRef Chen, L.: Using algebraic signatures to check data possession in cloud storage. Fut. Gener. Comput. Syst. 29(7), 1709–1715 (2013)CrossRef
23.
Zurück zum Zitat Etemad, M., Küpçü, A.: Transparent, Distributed, and Replicated Dynamic Provable Data Possession, pp. 1–18. Springer, Berlin (2013) Etemad, M., Küpçü, A.: Transparent, Distributed, and Replicated Dynamic Provable Data Possession, pp. 1–18. Springer, Berlin (2013)
24.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, pp. 525–533 (2010) Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, pp. 525–533 (2010)
25.
Zurück zum Zitat Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)CrossRef Hao, Z., Zhong, S., Yu, N.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23(9), 1432–1437 (2011)CrossRef
Metadaten
Titel
A generic approach for integrity verification of big data
verfasst von
Rajat Saxena
Somnath Dey
Publikationsdatum
29.10.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 2/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2861-0

Weitere Artikel der Ausgabe 2/2019

Cluster Computing 2/2019 Zur Ausgabe

Premium Partner