Dynamic List Based Data Integrity Verification in Cloud Environment
Keywords:Cloud Computing, Cryptography, Cloud Security, Cloud Auditing, Elliptic Curve Encryption, Data Integrity Verification, Information Security
Cloud repository gives a proficient way to fathom issues of management and capacity, driven by high-speed information emergence. Consequently, a developing number of governing bodies and people lean towards storing their information within the cloud premises. In any case, due to the partition of information ownership and administration, it becomes exceptionally troublesome for the users or the owners to verify the integrity of data in a routine way. Hence, numerous analysts center on creating various protocols, that remotely check the astuteness of the information saved within the cloud. In this respect, a conceivable solution is proposed for dynamic reviewing by making use of a dynamic list-based index table to verify the integrity of the data which is more efficient than the state of the arts. Besides, with such a verification structure, it is proven that communication cost and storage cost at the client side is diminished effectively. The statistical analysis based on comprehensive tests illustrates that the proposed convention accomplishes the specified properties in comparison with the state of the arts.
Ateniese, G., Burns, R., Curtmola, R. et al., “Provable Data Possession at untrusted stores”, in Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS ’07), pp. 598–609, Virginia, Va, USA, November, 2007.
Juels A., Kalski Jr., B. R., “PORs: Proofs of Retrievability for Large Files”, in Proceedings of 14th ACM Conference in Computer and Communications Security, pp. 584–597, ACM, Alexandria, VA, USA, November, 2007.
Anisetti, M., Ardagna, C., Damiani, E., and Gaudenzi, F., “A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification”, in IEEE Transactions on Services Computing, 2017.
Erway, C., Papamanthou, A. Küpçü C., and Tamassia R., “Dynamic provable data possession”, in Proceedings of the 16th ACM Conference on Computer and Comunications Security, pp. 213–222, ACM, Chicago, Ill, USA, November, 2009.
Wang, Q., Wang, C., Ren, C., Lou, W., and Li, J., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, in IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859, (2011).
Zhu, Y., Ahn, G. -J., Hu, H., Yau, S. S., An. H. G. and Hu. C. -J., “Dynamic Audit Services for Outsourced Storages in Clouds”, IEEE Transactions on Services Computing, Vol. 6, No. 2, pp. 227–238, 2013.
Tian H., Chen, Y., Chang, C. -C. et al, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, in IEEE Transactions on Services Computing, Vol. 10, No. 5, pp. 701–714, 2017.
Shen, J., Shen, J., Chen, X., Huang, X., and Susilo, W., “An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data” in IEEE Transactions on Information Forensics and Security, Vol. 12, No. 10, pp. 2402–2415, 2017.
Kwon et. al, “A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage”, in The Scientific World, May, 2014.
More, S., Chaudhari, S., “Third Party Public Auditing Scheme for Cloud Storage”, in 7th International Conference on Communication, Computing and Virtualization, (2016).
Yuan, J., and Yu, S., “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification”, in IEEE Transactions on Information Forensics and Security, 10 (8), (2015, August).
Zargad, S. V., Tambile, A. V., Sankoli, S. S., and Bhongale, R. C., “Data Integrity Checking Protocol with Data Dynamics and Public Verifiability for Secure Cloud Computing”, in International Journal of Computer Science and Information Technologies (IJCSIT), 5 (3), 4062–4064, 2014.
Kaaniche, N., “Cloud Data Storage Security Based on Cryptographic Mechanisms”, Ph.D. dissertation, Informatique, Telecommunications et Electronique de Paris, 2014.
Li, R., Shen, C., He, H., Gu, X., Xu, Z., and Xu, C. Z., “A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing”, in IEEE Transactions on Cloud Computing, 6 (2), 344–357, April, 2018.
Sarkar, M. K., and Chatterjee, T., “Enhancing data storage security in cloud computing through steganography”, May, 2014.
Sun, L., Xu, C., Zhang, Y. and Chen, K., “An efficient iO-based data integrity verification scheme for cloud storage”, in Science China Information Science, 62, doi: https://doi.org/10.1007/s11432-018-9500-0, 2019.
Shah, H., Shah, J., and Desai, U., “Third party public auditing scheme for security in cloud storage”, in International Journal of Trend in Scientific Research and Development (ijtsrd), 3, 179–184, April, 2019.
Akshay, K., and Balachandra, M., “Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment”, in Security in Computing and Communications, Springer Singapore, pp. 617–627, isbn: 978-981-13-5826-5, 2019.
Wang, C. and Di, X., “Research on Integrity Check Method of Cloud Storage Multi-Copy Data Based on Multi-Agent”, in IEEE Access, Vol. 8, pp. 17170–17178, 2020.
Ganesh, S. M., Manikandan, S. P., “An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users”, in “Security in Communication Networks”, Vol. 2020, doi: 10.1155/2020/9809874, 2020.
Chidambaram, N., Raj, P., Themozhi, K., Anirtharajan, R., “Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique”, in International Journal of Digital Multimedia Broadcasting, doi: http://dx.doi.org/10.1155/2016/8789397, 2016.
“CloudSim: A Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services”, http://www.cloudbus.org/cloudsim/, Accessed: 2020.
Chen, W., Tian, H., Chang, C., Nan, F., Lu, J., “Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing”, in Wireless Communications and Mobile Computing, https://doi.org/10.1155/2018/3471312, 2018.
Du, R., Deng, L., Chen, J., He, K., Zheng, M., “Proofs of Ownership and Retrievability in Cloud Storage”, in IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Ed. IEEE Computer Society, pp. 328–335, 2014.
Yang, K. and Jia, X., “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, in IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 9, pp.1717–1726, doi: 10.1109/TPDS.2012.278, 2013.
Liu D., and Zic. J, “Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators”, in IEEE Trustcom/BigDataSE/ISPA, Ed. IEEE Computer Society, 2015.
Boneh, Dan and Lynn, Ben and Shacham, Hovav, “Short signatures from the Weil pairing”, in International conference on the theory and application of cryptology and information security, Pub. Sringer, pg. 514–532, 2001.
Wang, C., Chow, S.S., Wang, Q., Ren, K. and Lou, W., “Privacy-preserving public auditing for secure cloud storage”, in IEEE transactions on computers, 62(2), pp. 362–375, 2011.
Wang, C., Wang, Q., Ren, K., Cao, N. and Lou, W., “Toward secure and dependable storage services in cloud computing”, in IEEE transactions on Services Computing, 5(2), pp. 220–232, 2011.
Yang, K. and Jia, X., “An efficient and secure dynamic auditing protocol for data storage in cloud computing”, in IEEE transactions on parallel and distributed systems, 24(9), pp. 1717–1726, 2012.
Shen, J., Shen, J., Chen, X., Huang, X. and Susilo, W., “An efficient public auditing protocol with novel dynamic structure for cloud data”, in IEEE Transactions on Information Forensics and Security, 12(10), pp. 2402–2415. 2017.
How to Cite
Copyright (c) 2022 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.