Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

18.01.2020

An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA

verfasst von: Abu Salim, Rajesh Kumar Tiwari, Sachin Tripathi

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage is a cloud based service which delivers scalable on demand on line storage of data and eliminates the need of maintaining local data centre. Storage of data in cloud brings many advantages such as lower-cost, metered service, scalable and ubiquitous access. However, it also raises concerns to its integrity; to save the storage space cloud service provider may delete some rarely access data. Data privacy is another issue which must be addressed to increase data owner’s trust. To address above issues, many researchers have proposed public auditing schemes to validate the integrity of data using third party auditor. These schemes generate metadata using data files on the owner side and store these metadata on the cloud storage along with the file data, which helps in auditing. These schemes address many concerns which arise due to remote data storage. However, computation cost involved for metadata generation at the data owner side is not properly addressed; another issue which is not properly addressed is an iniquitous third party auditor may be the source of denial of service attack by issuing constantly large number of audit request. Our scheme solves these issues by lowering the computation cost at data owner side and controlling the number of times a third party auditor can issue an audit request to the cloud storage. Our Scheme also supports secure access of data using conditional proxy re-encryption scheme and delegation of auditing task by the authorized third party auditor to another auditor for the specified period of times in the case of unavailability of authorized third party auditor.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583–592.CrossRef Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583–592.CrossRef
2.
Zurück zum Zitat Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In: Proceeding. 14th ACM Conference Computer and Comm. Security (CCS 07) (pp. 598–609). Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In: Proceeding. 14th ACM Conference Computer and Comm. Security (CCS 07) (pp. 598–609).
3.
Zurück zum Zitat Juels, A., & Kaliski, B., S. (2007). Pors: Proofs of retrievability for large files. In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York (pp. 584–597). Juels, A., & Kaliski, B., S. (2007). Pors: Proofs of retrievability for large files. In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York (pp. 584–597).
4.
Zurück zum Zitat Tang, Q. (2008). Type-based proxy re-encryption and its construction. In Indocrypt 2008, LNCS 5365, Springer, Heidelberg (pp. 130–144). Tang, Q. (2008). Type-based proxy re-encryption and its construction. In Indocrypt 2008, LNCS 5365, Springer, Heidelberg (pp. 130–144).
5.
Zurück zum Zitat Weng, J., Robert, H., Deng, Ding, X., Cheng-Kang, C., & Junzuo, L. (2009). Conditional proxy re-encryption secure against chosen-ciphertext attack. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, March 10–12, Sydney, Australia. https://doi.org/10.1145/1533057.1533100. Weng, J., Robert, H., Deng, Ding, X., Cheng-Kang, C., & Junzuo, L. (2009). Conditional proxy re-encryption secure against chosen-ciphertext attack. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, March 1012, Sydney, Australia. https://​doi.​org/​10.​1145/​1533057.​1533100.
6.
Zurück zum Zitat Deswarte, Y., Quisquater, J. J., & Saïdane, A. (2006). Remote integrity checking. In Proceedings of IICIS 2003 (pp. 1–11). Deswarte, Y., Quisquater, J. J., & Saïdane, A. (2006). Remote integrity checking. In Proceedings of IICIS 2003 (pp. 1–11).
7.
Zurück zum Zitat Filho, D. L. Z.,& Barreto, P. S. L. M. (2006). Demonstrating Data Possession and Uncheatable Data Transfer. In Cryptology ePrint Archive, Report2006/150, 2006, http://eprint.iacr.org. Filho, D. L. Z.,& Barreto, P. S. L. M. (2006). Demonstrating Data Possession and Uncheatable Data Transfer. In Cryptology ePrint Archive, Report2006/150, 2006, http://​eprint.​iacr.​org.
8.
Zurück zum Zitat Zhang, Y., Ni, J., Tao, X., Wang, Y., & Yu, Y. (2016). Provable multiple replication data possession with full dynamics for secure cloud storage. Concurrency and Computation: Practice and Experience, 28(4), 1161–1173.CrossRef Zhang, Y., Ni, J., Tao, X., Wang, Y., & Yu, Y. (2016). Provable multiple replication data possession with full dynamics for secure cloud storage. Concurrency and Computation: Practice and Experience, 28(4), 1161–1173.CrossRef
9.
Zurück zum Zitat Abo-alian, A., Badr, N. L., & Tolba, M. F. (2017). Integrity as a service for replicated data on the cloud. Concurrency and Computation: Practice and Experience, 29(4), e3883.CrossRef Abo-alian, A., Badr, N. L., & Tolba, M. F. (2017). Integrity as a service for replicated data on the cloud. Concurrency and Computation: Practice and Experience, 29(4), e3883.CrossRef
11.
Zurück zum Zitat Erway, C. C., Kupcu, A., Papamanthou, C., & Tamassia R. (2009). Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Illinois, USA (pp. 213–222). Erway, C. C., Kupcu, A., Papamanthou, C., & Tamassia R. (2009). Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Illinois, USA (pp. 213–222).
12.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2010). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859.CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2010). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859.CrossRef
13.
Zurück zum Zitat Liu, C., Chen, J., Yang, L. T., Zhang, X., Yang, C., Ranjan, R., et al. (2013). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2234–2244.CrossRef Liu, C., Chen, J., Yang, L. T., Zhang, X., Yang, C., Ranjan, R., et al. (2013). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2234–2244.CrossRef
14.
Zurück zum Zitat Poornima, S. N., & Ponmagal, R. S. (2016). Secure preserving public auditing for regenerating code based on cloud storage. Networking Communication Engineering, 8(5), 200–204. Poornima, S. N., & Ponmagal, R. S. (2016). Secure preserving public auditing for regenerating code based on cloud storage. Networking Communication Engineering, 8(5), 200–204.
15.
Zurück zum Zitat Sookhak, M., Yu, F. R., & Zomaya, A. Y. (2017). Auditing big data storage in cloud computing using divide and conquer tables. IEEE Transactions on Parallel and Distributed Systems, 29(5), 999–1012.CrossRef Sookhak, M., Yu, F. R., & Zomaya, A. Y. (2017). Auditing big data storage in cloud computing using divide and conquer tables. IEEE Transactions on Parallel and Distributed Systems, 29(5), 999–1012.CrossRef
16.
Zurück zum Zitat Liang, K., Susilo, W., Liu, J. K., & Wong, D. S. (2015). Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. The Computer Journal, 58(10), 2778–2792.CrossRef Liang, K., Susilo, W., Liu, J. K., & Wong, D. S. (2015). Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. The Computer Journal, 58(10), 2778–2792.CrossRef
19.
Zurück zum Zitat Boneh, D., Gentry, G., Lynn B., & Shacham, H.(2003). Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings 22nd internationall conference theory and applications of cryptographic techniques (Eurocrypt ’03) (pp. 416–432). Boneh, D., Gentry, G., Lynn B., & Shacham, H.(2003). Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings 22nd internationall conference theory and applications of cryptographic techniques (Eurocrypt ’03) (pp. 416–432).
Metadaten
Titel
An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA
verfasst von
Abu Salim
Rajesh Kumar Tiwari
Sachin Tripathi
Publikationsdatum
18.01.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07079-7

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt