Weitere Kapitel dieses Buchs durch Wischen aufrufen
Cloud computing enables the users to outsource and access data economically from the distributed cloud server. Cloud provider offers data storage as a service and share the data across multiple authorized users in a cost-effective manner. In the cloud-computing model, once the data leaves the owner premises, there is no control of data to the data owner. To provide security for the outsources, data is one of the challenging tasks in cloud computing. Public auditing of outsourced data to verify the integrity of the data provides the data security. In this paper, we proposed a multisector public auditing system by utilizing a linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads by utilizing linear combination of homomorphic linear authenticator tags of the file blocks. Our proposed method performs the multiple auditing tasks simultaneously, without retrieving the entire file, which reduces the computation and communication overheads in the auditing. The analysis of the proposed system shows that, multisector public auditing method is better than the existing auditing method in terms of data security, communication, and computation overheads.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Rivest, R. L. and Shamir, A. and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
Rivest, R., The md5 message-digest algorithm, 2014.
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu, Dynamic audit services for outsourced storages in clouds, in IEEE TRANSACTIONS ON SERVICES COMPUTING, vol. 6, pp. 227–238, April-June 2013.
Jiang Deng, Chunxiang Xu, Huai Wu and Liju Dong, A new certificateless signature with enhanced security and aggregation version, Concurrency and Computation: Practice and Experience, vol. 28, no. 4, pp. 1124–1133, 2016.
Tao Jiang, Xiaofeng Chen, and Jianfeng Ma, Public integrity auditing for shared dynamic cloud data with group user revocation, in IEEE Transactions on Computers, 2015.
Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, and Wenjing Lou, Privacy-preserving public auditing for secure cloud storage, in IEEE Transactions on Computers, vol. 22, no. 2, 2013.
Jiawei Yuan; Shucheng Yu, Public integrity auditing for dynamic data sharing with multiuser modification, IEEE Transactions on Services Computing, vol. 10, pp. 1717–1726, 2015.
Hui Tian; Yuxiang Chen; Chin-Chen Chang; Hong Jiang; Yongfeng Huang; Yonghong Chen; Jin Liu, Dynamic-hash-table based public auditing for secure cloud storage, IEEE Transactions on Services Computing, vol. 99, 2016.
Juels, Ari and Kaliski, Jr., Burton S., Pors: Proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 07, pp. 584–597, ACM, 2007.
Ateniese, Giuseppe and Burns, Randal and Curtmola, Reza and Herring, Joseph and Kissner, Lea and Peterson, Zachary and Song, Dawn, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 07, pp. 598–609, ACM, 2007.
Erway, C. Chris and Kupc u, Alptekin and Papamanthou, Charalampos and Tamassia, Roberto, Dynamic provable data possession, ACM Trans. Inf. Syst. Secur., vol. 17, no. 4, 2015.
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li, Enabling public auditability and data dynamics for storage security in cloud computing, in IEEE Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS09), 2009.
Boyang Wang; Hui Li; Xuefeng Liu; Fenghua Li; Xiaoqing Li, Efficient public verification on the integrity of multi-owner data in the cloud, Journal of Communications and Networks, vol. 16, no. 6, pp. 592–599, 2014.
- Secure Public Auditing Using Batch Processing for Cloud Data Storage
G. L. Prakash
- Springer Singapore
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com