Skip to main content
Top
Published in: Cluster Computing 3/2019

18-01-2018

Privacy preserving auditing protocol for remote data storage

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent days, applications are becoming highly pervasive and enrich end user devices with various functionalities. The resource constraints at client side restrict the usage of many applications which need high storage and intensive computation. Cloud computing simplifies the deployment of large-scale distributed systems and enables advanced computational power with improved storage capabilities. Its evolution can be used for outsourcing data storage and processing. In spite of the relief, the clients no longer have control over their outsourced data which demands the purpose of ensuring the data intactness maintained by the Cloud Storage Server. For the verification of data correctness a third party trusted verifier is introduced in the proposed work which maintains dynamic metadata stored locally for the verification process. Bilinear mapping is used to ensure verification without retrieving the original data called blockless process. The verification proof generated using the proposed method is a small signature, which reduces the auditing overhead at the client side compared to existing solution. The proposed privacy preserving data auditing protocol relaxes the end users by reducing the computational overhead and achieves the verification of storage service.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Special Publication 800-145. National Institute of Standards and Technology (NIST), Gaithersburg (2011)CrossRef Mell, P., Grance, T.: The NIST Definition of Cloud Computing. Special Publication 800-145. National Institute of Standards and Technology (NIST), Gaithersburg (2011)CrossRef
2.
go back to reference Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef
3.
go back to reference Carretero, J., Blas, J.G.: Introduction to cloud computing: platforms and solutions. Cluster Comput. 17(4), 1225–1229 (2014)CrossRef Carretero, J., Blas, J.G.: Introduction to cloud computing: platforms and solutions. Cluster Comput. 17(4), 1225–1229 (2014)CrossRef
4.
go back to reference Velte, A.T., Velte, T.J., Elsenpeter, R.C.: Cloud Computing: A Practical Approach, 1st edn. McGraw-Hill Inc., New York (2010) Velte, A.T., Velte, T.J., Elsenpeter, R.C.: Cloud Computing: A Practical Approach, 1st edn. McGraw-Hill Inc., New York (2010)
5.
go back to reference Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef
8.
go back to reference Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Provable data possession at untrusted stores. In: Proceeding of ACM CCS’07, Alexandria, pp. 598–609 (2007) Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Provable data possession at untrusted stores. In: Proceeding of ACM CCS’07, Alexandria, pp. 598–609 (2007)
9.
go back to reference Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12 (2011)CrossRef Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12 (2011)CrossRef
10.
go back to reference Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceeding of 14th ACM Conference Computer and Communication Security (CCS ’07), pp. 584–597 (2007) Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceeding of 14th ACM Conference Computer and Communication Security (CCS ’07), pp. 584–597 (2007)
11.
go back to reference Shacham H., Waters, B.: Compact proofs of retrievability. In: Proceeding of Asiacrypt’08, Sydney, pp. 90–107 (2008)CrossRef Shacham H., Waters, B.: Compact proofs of retrievability. In: Proceeding of Asiacrypt’08, Sydney, pp. 90–107 (2008)CrossRef
13.
go back to reference Giuseppe, A., Seny, K., Jonathan, K.: Proofs of storage from homomorphic identification protocols. In: Proceeding of Asiacrypt’09, Tokyo, pp. 319–333 (2009) Giuseppe, A., Seny, K., Jonathan, K.: Proofs of storage from homomorphic identification protocols. In: Proceeding of Asiacrypt’09, Tokyo, pp. 319–333 (2009)
14.
go back to reference Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. In: Proceeding of ESORICS’09, France, pp. 355–370 (2009) Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. In: Proceeding of ESORICS’09, France, pp. 355–370 (2009)
15.
go back to reference Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
16.
go back to reference Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceeding of ACM Symposium Applied Computing, pp. 1550–1557 (2011) Zhu, Y., Wang, H., Hu, Z., Ahn, G.-J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceeding of ACM Symposium Applied Computing, pp. 1550–1557 (2011)
17.
go back to reference Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 717–1726 (2013)CrossRef Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 717–1726 (2013)CrossRef
18.
go back to reference Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)MathSciNetCrossRef
19.
go back to reference Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29(7), 1709–1715 (2013)CrossRef Chen, L.: Using algebraic signatures to check data possession in cloud storage. Future Gener. Comput. Syst. 29(7), 1709–1715 (2013)CrossRef
20.
go back to reference Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Cryptology ePrint Archive Report 2009/281 (2009)CrossRef Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Cryptology ePrint Archive Report 2009/281 (2009)CrossRef
21.
go back to reference Merkle, R.C.: Protocols for public key cryptosystems. In: Proceeding of IEEE Symposium on Security and Privacy, Oakland. (1980) Merkle, R.C.: Protocols for public key cryptosystems. In: Proceeding of IEEE Symposium on Security and Privacy, Oakland. (1980)
23.
go back to reference Bleumer, G.: Random Oracle model. In: Encyclopedia of Cryptography and Security, Springer, New York. pp. 1027–1028 (2011) Bleumer, G.: Random Oracle model. In: Encyclopedia of Cryptography and Security, Springer, New York. pp. 1027–1028 (2011)
24.
go back to reference Zhang, J., Meng, H., Yu, Y.: Achieving public verifiability and data dynamics for cloud data in the standard model. Cluster Comput. 20, 2641–2653 (2017)CrossRef Zhang, J., Meng, H., Yu, Y.: Achieving public verifiability and data dynamics for cloud data in the standard model. Cluster Comput. 20, 2641–2653 (2017)CrossRef
25.
go back to reference Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Advances in Cryptology—ASIACRYPT 2001. LNCS 2248, pp. 514–532 (2001)CrossRef Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Advances in Cryptology—ASIACRYPT 2001. LNCS 2248, pp. 514–532 (2001)CrossRef
Metadata
Title
Privacy preserving auditing protocol for remote data storage
Publication date
18-01-2018
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-1701-6

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner