Skip to main content
Erschienen in: The Journal of Supercomputing 5/2021

29.10.2020

BB-tree based secure and dynamic public auditing convergence for cloud storage

verfasst von: Rahul Mishra, Dharavath Ramesh, Damodar Reddy Edla

Erschienen in: The Journal of Supercomputing | Ausgabe 5/2021

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is a current phrase in marketing for an idea which has been recognized for years: Outsourcing. Cloud computing provides a large amount of gratuities for each customer and enterprise agency. “Cloud model” is a more of a notion in which the data are hosted online and accessed in a time-anywhere manner, on a pay-per-use model. However, the users may not fully trust the cloud service providers (CSPs) in that environment. So, it is hard to decide whether the CSP meet their expectations to provide the proper secrecy to shared data. Moreover, in the environment of outsourcing, users have no longer control and ownership of data which may cause serious major issues related to data integrity. Previously, many researchers have committed themselves to draft auditing protocols for attaining proper public verification schemes through third-party auditor (TPA). On the other hand, these schemes may leak identity or data value to the third-party auditor. Therefore, to deal with these problems, we introduce an efficient public auditing protocol by constructing binary binomial tree (BBT)-like data structure with Boneh–Lynn–Shacham signature-based Homomorphic Verifiable Authenticator (BLS-HVA). This model also consists an index hash table (IHT), situated at TPA to record the information about the data block’s properties for auditing procedure. This model supports sampling blockless verification, batch auditing, and dynamic updating operations. Moreover, with such novel dynamic data structure, the proposed model guarantees that user’s group can easily trace any type of data changes through the designated BBT. Along with this, the users can also easily recover the accurate data blocks whenever the current data blocks are corrupted. The experimental results demonstrate that the proposed auditing model efficiently attains secure auditing for the cloud environment and outperforms the existing models in terms of communication and computation overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abbasi AA, Abbasi A, Shamshirband S, Chronopoulos AT, Persico V, Pescapè A (2019) Software-defined cloud computing: a systematic review on latest trends and developments. IEEE Access 7:93294–93314CrossRef Abbasi AA, Abbasi A, Shamshirband S, Chronopoulos AT, Persico V, Pescapè A (2019) Software-defined cloud computing: a systematic review on latest trends and developments. IEEE Access 7:93294–93314CrossRef
2.
Zurück zum Zitat Miyachi C (2018) What is “Cloud”? It is time to update the NIST definition? IEEE Cloud Comput 3:6–11 Miyachi C (2018) What is “Cloud”? It is time to update the NIST definition? IEEE Cloud Comput 3:6–11
3.
Zurück zum Zitat Hsien WF, Yang CC, Hwang MS (2016) A survey of public auditing for secure data storage in cloud computing. IJ Netw Secur 18(1):133–142 Hsien WF, Yang CC, Hwang MS (2016) A survey of public auditing for secure data storage in cloud computing. IJ Netw Secur 18(1):133–142
4.
Zurück zum Zitat Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRef
6.
Zurück zum Zitat Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev 33:1–48MathSciNetCrossRef Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev 33:1–48MathSciNetCrossRef
8.
Zurück zum Zitat Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113:130–139CrossRef Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113:130–139CrossRef
9.
Zurück zum Zitat Yu Y, Niu L, Yang G, Mu Y, Susilo W (2014) On the security of auditing mechanisms for secure cloud storage. Future Gener Comput Syst 30:127–132CrossRef Yu Y, Niu L, Yang G, Mu Y, Susilo W (2014) On the security of auditing mechanisms for secure cloud storage. Future Gener Comput Syst 30:127–132CrossRef
14.
Zurück zum Zitat Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415CrossRef Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415CrossRef
23.
Zurück zum Zitat Wu L, Wang J, Zeadally S, He D (2018) Privacy-preserving auditing scheme for shared data in public clouds. J Supercomput 74(11):6156–6183CrossRef Wu L, Wang J, Zeadally S, He D (2018) Privacy-preserving auditing scheme for shared data in public clouds. J Supercomput 74(11):6156–6183CrossRef
26.
Zurück zum Zitat Li J, Yan H, Zhang Y (2020) Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst J Li J, Yan H, Zhang Y (2020) Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst J
27.
Zurück zum Zitat Xue L, Ni J, Li Y, Shen J (2017) Provable data transfer from provable data possession and deletion in cloud storage. Comput Stand Interfaces 54:46–54CrossRef Xue L, Ni J, Li Y, Shen J (2017) Provable data transfer from provable data possession and deletion in cloud storage. Comput Stand Interfaces 54:46–54CrossRef
28.
Zurück zum Zitat Aujla GS, Chaudhary R, Kumar N, Das AK, Rodrigues JJ (2018) SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun Mag 56(1):78–85CrossRef Aujla GS, Chaudhary R, Kumar N, Das AK, Rodrigues JJ (2018) SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun Mag 56(1):78–85CrossRef
29.
Zurück zum Zitat Zhang J, Dong Q (2016) Efficient ID-based public auditing for the outsourced data in cloud storage. Inf Sci 343:1–14MathSciNet Zhang J, Dong Q (2016) Efficient ID-based public auditing for the outsourced data in cloud storage. Inf Sci 343:1–14MathSciNet
30.
Zurück zum Zitat Tian H, Nan F, Jiang H, Chang CC, Ning J, Huang Y (2019) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125CrossRef Tian H, Nan F, Jiang H, Chang CC, Ning J, Huang Y (2019) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125CrossRef
35.
37.
Zurück zum Zitat Arabacı O, Kiraz MS, Sertkaya I, Uzunkol O (2015). More efficient secure outsourcing methods for bilinear maps. Cryptology ePrint Archive, Report 2015/960 Arabacı O, Kiraz MS, Sertkaya I, Uzunkol O (2015). More efficient secure outsourcing methods for bilinear maps. Cryptology ePrint Archive, Report 2015/960
39.
Zurück zum Zitat He D, Kumar N, Wang H, Wang L, Choo KKR (2017) Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl Math Comput 314:31–43MathSciNetMATH He D, Kumar N, Wang H, Wang L, Choo KKR (2017) Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl Math Comput 314:31–43MathSciNetMATH
40.
Zurück zum Zitat Li J, Yan H, Zhang Y (2018) Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput Li J, Yan H, Zhang Y (2018) Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput
45.
Zurück zum Zitat Mishra R, Ramesh D, Edla DR, Sah MK (2020) Binary binomial tree based secure and efficient electronic healthcare record storage in cloud environment. International Conference on Innovations for Community Services. Springer, Cham, pp 173–186CrossRef Mishra R, Ramesh D, Edla DR, Sah MK (2020) Binary binomial tree based secure and efficient electronic healthcare record storage in cloud environment. International Conference on Innovations for Community Services. Springer, Cham, pp 173–186CrossRef
46.
Zurück zum Zitat Syam Kumar P, Subramanian R (2012) RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence. Int J Cloud Comput 1(2–3):167–200CrossRef Syam Kumar P, Subramanian R (2012) RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence. Int J Cloud Comput 1(2–3):167–200CrossRef
47.
Zurück zum Zitat Liu CW, Hsien WF, Yang CC, Hwang MS (2016) A survey of public auditing for shared data storage with user revocation in cloud computing. IJ Netw Secur 18(4):650–666 Liu CW, Hsien WF, Yang CC, Hwang MS (2016) A survey of public auditing for shared data storage with user revocation in cloud computing. IJ Netw Secur 18(4):650–666
48.
Zurück zum Zitat Ren YJ, Shen J, Wang J, Han J, Lee SY (2015) Mutual verifiable provable data auditing in public cloud storage. 16(2):317–323 Ren YJ, Shen J, Wang J, Han J, Lee SY (2015) Mutual verifiable provable data auditing in public cloud storage. 16(2):317–323
49.
Zurück zum Zitat Menezes AJ, Katz J, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca RatonMATH Menezes AJ, Katz J, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca RatonMATH
50.
Zurück zum Zitat Yacobi Y (2002) A note on the bilinear Diffie-Hellman assumption. IACR Cryptol. ePrint Arch. 2002, 113 Yacobi Y (2002) A note on the bilinear Diffie-Hellman assumption. IACR Cryptol. ePrint Arch. 2002, 113
51.
Zurück zum Zitat Galbraith SD, Gaudry P (2016) Recent progress on the elliptic curve discrete logarithm problem. Des Codes Cryptogr 78(1):51–72MathSciNetCrossRef Galbraith SD, Gaudry P (2016) Recent progress on the elliptic curve discrete logarithm problem. Des Codes Cryptogr 78(1):51–72MathSciNetCrossRef
52.
Zurück zum Zitat Lu JZ, Zhou J (2012) Preventing delegation-based mobile authentications from man-in-the-middle attacks. Comput Stand Interfaces 34(3):314–326CrossRef Lu JZ, Zhou J (2012) Preventing delegation-based mobile authentications from man-in-the-middle attacks. Comput Stand Interfaces 34(3):314–326CrossRef
Metadaten
Titel
BB-tree based secure and dynamic public auditing convergence for cloud storage
verfasst von
Rahul Mishra
Dharavath Ramesh
Damodar Reddy Edla
Publikationsdatum
29.10.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 5/2021
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03456-y

Weitere Artikel der Ausgabe 5/2021

The Journal of Supercomputing 5/2021 Zur Ausgabe