Dynamic List Based Data Integrity Verification in Cloud Environment

Authors

  • Akshay KC Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India
  • Balachandra Muniyal Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India

DOI:

https://doi.org/10.13052/jcsm2245-1439.1134

Keywords:

Cloud Computing, Cryptography, Cloud Security, Cloud Auditing, Elliptic Curve Encryption, Data Integrity Verification, Information Security

Abstract

Cloud repository gives a proficient way to fathom issues of management and capacity, driven by high-speed information emergence. Consequently, a developing number of governing bodies and people lean towards storing their information within the cloud premises. In any case, due to the partition of information ownership and administration, it becomes exceptionally troublesome for the users or the owners to verify the integrity of data in a routine way. Hence, numerous analysts center on creating various protocols, that remotely check the astuteness of the information saved within the cloud. In this respect, a conceivable solution is proposed for dynamic reviewing by making use of a dynamic list-based index table to verify the integrity of the data which is more efficient than the state of the arts. Besides, with such a verification structure, it is proven that communication cost and storage cost at the client side is diminished effectively. The statistical analysis based on comprehensive tests illustrates that the proposed convention accomplishes the specified properties in comparison with the state of the arts.

Downloads

Download data is not yet available.

Author Biographies

Akshay KC, Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India

Akshay, KC received his B.E. degree in Information Science from Viswesvaraya Technological University, Belagavi. He has received his M.Tech. degree in Software Engieering from Manipal University. He is currently pursuing his Ph.D. degree in Cloud Security with the Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, where he is currently an Assistant Professor (Senior). His research interests include information security, network security, algorithms, data structures, data base systems and software engineering.

Balachandra Muniyal, Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India

Balachandra Muniyal received the B.E. degree in computer science and engineering from Mysore University and the M.Tech. and Ph.D. degrees in computer science and engineering from the Manipal Academy of Higher Education, Manipal, India. He carried out his M.Tech. project work in T-Systems Nova GmbH, Bremen, Germany. He was deputed to Manipal International University, Malaysia, in 2014. He is currently a Professor with the Department of Information & Communication Technology, Manipal Institute of Technology, Manipal. He has 25 years of teaching experience in various Institutes. He has more than 30 publications in national and international conferences/journals. His research interest includes network security.

References

Ateniese, G., Burns, R., Curtmola, R. et al., “Provable Data Possession at untrusted stores”, in Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS ’07), pp. 598–609, Virginia, Va, USA, November, 2007.

Juels A., Kalski Jr., B. R., “PORs: Proofs of Retrievability for Large Files”, in Proceedings of 14th ACM Conference in Computer and Communications Security, pp. 584–597, ACM, Alexandria, VA, USA, November, 2007.

Anisetti, M., Ardagna, C., Damiani, E., and Gaudenzi, F., “A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification”, in IEEE Transactions on Services Computing, 2017.

Erway, C., Papamanthou, A. Küpçü C., and Tamassia R., “Dynamic provable data possession”, in Proceedings of the 16th ACM Conference on Computer and Comunications Security, pp. 213–222, ACM, Chicago, Ill, USA, November, 2009.

Wang, Q., Wang, C., Ren, C., Lou, W., and Li, J., “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, in IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859, (2011).

Zhu, Y., Ahn, G. -J., Hu, H., Yau, S. S., An. H. G. and Hu. C. -J., “Dynamic Audit Services for Outsourced Storages in Clouds”, IEEE Transactions on Services Computing, Vol. 6, No. 2, pp. 227–238, 2013.

Tian H., Chen, Y., Chang, C. -C. et al, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, in IEEE Transactions on Services Computing, Vol. 10, No. 5, pp. 701–714, 2017.

Shen, J., Shen, J., Chen, X., Huang, X., and Susilo, W., “An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data” in IEEE Transactions on Information Forensics and Security, Vol. 12, No. 10, pp. 2402–2415, 2017.

Kwon et. al, “A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage”, in The Scientific World, May, 2014.

More, S., Chaudhari, S., “Third Party Public Auditing Scheme for Cloud Storage”, in 7th International Conference on Communication, Computing and Virtualization, (2016).

Yuan, J., and Yu, S., “Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification”, in IEEE Transactions on Information Forensics and Security, 10 (8), (2015, August).

Zargad, S. V., Tambile, A. V., Sankoli, S. S., and Bhongale, R. C., “Data Integrity Checking Protocol with Data Dynamics and Public Verifiability for Secure Cloud Computing”, in International Journal of Computer Science and Information Technologies (IJCSIT), 5 (3), 4062–4064, 2014.

Kaaniche, N., “Cloud Data Storage Security Based on Cryptographic Mechanisms”, Ph.D. dissertation, Informatique, Telecommunications et Electronique de Paris, 2014.

Li, R., Shen, C., He, H., Gu, X., Xu, Z., and Xu, C. Z., “A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing”, in IEEE Transactions on Cloud Computing, 6 (2), 344–357, April, 2018.

Sarkar, M. K., and Chatterjee, T., “Enhancing data storage security in cloud computing through steganography”, May, 2014.

Sun, L., Xu, C., Zhang, Y. and Chen, K., “An efficient iO-based data integrity verification scheme for cloud storage”, in Science China Information Science, 62, doi: https://doi.org/10.1007/s11432-018-9500-0, 2019.

Shah, H., Shah, J., and Desai, U., “Third party public auditing scheme for security in cloud storage”, in International Journal of Trend in Scientific Research and Development (ijtsrd), 3, 179–184, April, 2019.

Akshay, K., and Balachandra, M., “Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment”, in Security in Computing and Communications, Springer Singapore, pp. 617–627, isbn: 978-981-13-5826-5, 2019.

Wang, C. and Di, X., “Research on Integrity Check Method of Cloud Storage Multi-Copy Data Based on Multi-Agent”, in IEEE Access, Vol. 8, pp. 17170–17178, 2020.

Ganesh, S. M., Manikandan, S. P., “An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users”, in “Security in Communication Networks”, Vol. 2020, doi: 10.1155/2020/9809874, 2020.

Chidambaram, N., Raj, P., Themozhi, K., Anirtharajan, R., “Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique”, in International Journal of Digital Multimedia Broadcasting, doi: http://dx.doi.org/10.1155/2016/8789397, 2016.

“CloudSim: A Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services”, http://www.cloudbus.org/cloudsim/, Accessed: 2020.

Chen, W., Tian, H., Chang, C., Nan, F., Lu, J., “Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing”, in Wireless Communications and Mobile Computing, https://doi.org/10.1155/2018/3471312, 2018.

Du, R., Deng, L., Chen, J., He, K., Zheng, M., “Proofs of Ownership and Retrievability in Cloud Storage”, in IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Ed. IEEE Computer Society, pp. 328–335, 2014.

Yang, K. and Jia, X., “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, in IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 9, pp.1717–1726, doi: 10.1109/TPDS.2012.278, 2013.

Liu D., and Zic. J, “Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message Authenticators”, in IEEE Trustcom/BigDataSE/ISPA, Ed. IEEE Computer Society, 2015.

Boneh, Dan and Lynn, Ben and Shacham, Hovav, “Short signatures from the Weil pairing”, in International conference on the theory and application of cryptology and information security, Pub. Sringer, pg. 514–532, 2001.

Wang, C., Chow, S.S., Wang, Q., Ren, K. and Lou, W., “Privacy-preserving public auditing for secure cloud storage”, in IEEE transactions on computers, 62(2), pp. 362–375, 2011.

Wang, C., Wang, Q., Ren, K., Cao, N. and Lou, W., “Toward secure and dependable storage services in cloud computing”, in IEEE transactions on Services Computing, 5(2), pp. 220–232, 2011.

Yang, K. and Jia, X., “An efficient and secure dynamic auditing protocol for data storage in cloud computing”, in IEEE transactions on parallel and distributed systems, 24(9), pp. 1717–1726, 2012.

Shen, J., Shen, J., Chen, X., Huang, X. and Susilo, W., “An efficient public auditing protocol with novel dynamic structure for cloud data”, in IEEE Transactions on Information Forensics and Security, 12(10), pp. 2402–2415. 2017.

Downloads

Published

2022-07-22

Issue

Section

Articles

Most read articles by the same author(s)