Skip to main content

2018 | OriginalPaper | Buchkapitel

Strategies to Improve Auditing Performance and Soundness for Cloud Computation

verfasst von : Shin-Jia Hwang, Tsung-Lin Li

Erschienen in: Security with Intelligent Computing and Big-data Services

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since the cloud computation auditing becomes important recently, Wei et al. proposed their cloud computation auditing scheme. However, they assume that the cheating adversary always gives the random response for the auditing challenges. This assumption is impractical. When only a small part of adversary’s response is random, the number of challenges is increased dramatically. Then the auditing load becomes so heavy that the auditor cannot give the auditing results in reasonable time. Moreover, the probability of finding out incorrect computed results cannot reach that the users want. To improve the on-line audit performance or probability, the off-line easy-auditor improving strategy, the function-based improving strategy, and mixed strategy are proposed, respectively. Utilizing the off-line computation concept and the cloud computation server help, the online audit performance, and the audit probability will be improved.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Applied Cryptography and Network Security, ACNS 2012. LNCS, vol. 7341, pp. 507–525. Springer, Heidelberg (2012) Wang, B., Li, B., Li, H.: Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Applied Cryptography and Network Security, ACNS 2012. LNCS, vol. 7341, pp. 507–525. Springer, Heidelberg (2012)
2.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Oruta: Privacy-Preserving Auditing for Shared Data in the Cloud. In: Proceeding of IEEE 5th International Conference on Cloud Computing, IEEE Cloud 2012, pp. 295–302, Honolulu, HI, U.S.A, 24–29 June 2012 Wang, B., Li, B., Li, H.: Oruta: Privacy-Preserving Auditing for Shared Data in the Cloud. In: Proceeding of IEEE 5th International Conference on Cloud Computing, IEEE Cloud 2012, pp. 295–302, Honolulu, HI, U.S.A, 24–29 June 2012
3.
Zurück zum Zitat Wang, B., Li, B., Li, H.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: Proceeding of IEEE International Conference on Communications, ICC 2013, pp. 1946–1950, Budapest, Hungary, 9–13 June 2013 Wang, B., Li, B., Li, H.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: Proceeding of IEEE International Conference on Communications, ICC 2013, pp. 1946–1950, Budapest, Hungary, 9–13 June 2013
4.
Zurück zum Zitat Wang, C., Ren, K., Lou, W., Li, J.: Toward public auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRef Wang, C., Ren, K., Lou, W., Li, J.: Toward public auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRef
5.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. In: Proceeding of ESORICS 2009, Saint Malo, France, 21–25 September 2009, pp. 355–370 (2009) Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. In: Proceeding of ESORICS 2009, Saint Malo, France, 21–25 September 2009, pp. 355–370 (2009)
6.
Zurück zum Zitat Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Küpçü, A., Lysyanskaya, A.: Incentivizing outsourced computation. In: Proceedings of the 3rd International Workshop on Economics of Networked Systems, pp. 85–90, Seattle, WA, U.S.A, 17–22 August 2008 Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Küpçü, A., Lysyanskaya, A.: Incentivizing outsourced computation. In: Proceedings of the 3rd International Workshop on Economics of Networked Systems, pp. 85–90, Seattle, WA, U.S.A, 17–22 August 2008
7.
Zurück zum Zitat Canetti, R., Riva, B., Rothblum, G.: Verifiable computation with two or more clouds. In: Workshop on Cryptography and Security in Clouds, Zurich, Switzerland, 15–16 March 2011 Canetti, R., Riva, B., Rothblum, G.: Verifiable computation with two or more clouds. In: Workshop on Cryptography and Security in Clouds, Zurich, Switzerland, 15–16 March 2011
8.
Zurück zum Zitat Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: 30th International Cryptology Conference, CYPTO 2010, pp. 465–482, Santa Barbara, California, U.S.A, 15–19 August 2010 Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: 30th International Cryptology Conference, CYPTO 2010, pp. 465–482, Santa Barbara, California, U.S.A, 15–19 August 2010
9.
Zurück zum Zitat Golle, P., Mironov, I.: Uncheatable distributed computations. In: The Cryptographers’ Track at RSA Conference 2001, pp. 425–440, San Francisco, CA, U.S.A, 8–12 April 2001 Golle, P., Mironov, I.: Uncheatable distributed computations. In: The Cryptographers’ Track at RSA Conference 2001, pp. 425–440, San Francisco, CA, U.S.A, 8–12 April 2001
10.
Zurück zum Zitat Sadeghi, A., Schneider, T., Winandy, M.: Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Trust and Trustworthy Computing, pp. 417–429, Berlin, Germany, 21–23 June 2010 Sadeghi, A., Schneider, T., Winandy, M.: Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Trust and Trustworthy Computing, pp. 417–429, Berlin, Germany, 21–23 June 2010
11.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2012)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2012)CrossRef
12.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Jia, W., Vasilakos, A.: Seccloud: bridging secure storage and computation in cloud. In: 30th International Conference on Distributed Computing Systems Workshops, IEEE ICDCSW 2010, Genova, Italy, 21–25 June 2010 Wei, L., Zhu, H., Cao, Z., Jia, W., Vasilakos, A.: Seccloud: bridging secure storage and computation in cloud. In: 30th International Conference on Distributed Computing Systems Workshops, IEEE ICDCSW 2010, Genova, Italy, 21–25 June 2010
13.
Zurück zum Zitat Wei, L., Zhu, H., Cao, Z., Jia, W., Dong, X., Jia, W., Chen, Y., Vasilakos, A.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)CrossRef Wei, L., Zhu, H., Cao, Z., Jia, W., Dong, X., Jia, W., Chen, Y., Vasilakos, A.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)CrossRef
14.
Zurück zum Zitat Monrose, F., Wycko, P., Rubin, A.: Distributed execution with remote audit. In: Proceedings of the Network and Distributed Systems Security Symposium (NDSS), San Diego, California, U.S.A, pp. 103–113 (1999) Monrose, F., Wycko, P., Rubin, A.: Distributed execution with remote audit. In: Proceedings of the Network and Distributed Systems Security Symposium (NDSS), San Diego, California, U.S.A, pp. 103–113 (1999)
Metadaten
Titel
Strategies to Improve Auditing Performance and Soundness for Cloud Computation
verfasst von
Shin-Jia Hwang
Tsung-Lin Li
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-76451-1_17

Premium Partner