• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, ieee transactions on parallel and distributed systems, (2013)

by Kan Yang, Student Member, IEEE, Fellow XiaohuaJia, IEEE
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 13
Next 10 →

Enabling Cloud Storage Auditing With Key-Exposure Resistance

by Jia Yu , Senior Member, IEEE Kui Ren , Member, IEEE Cong Wang , Senior Member, IEEE Vijay Varadharajan - IEEE Transactions on Information Forensics and Security , 2015
"... Abstract-Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract-Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings at the client. If such a secret key for auditing is exposed, most of the current auditing protocols would inevitably become unable to work. In this paper, we focus on this new aspect of cloud storage auditing. We investigate how to reduce the damage of the client's key exposure in cloud storage auditing, and give the first practical solution for this new problem setting. We formalize the definition and the security model of auditing protocol with key-exposure resilience and propose such a protocol. In our design, we employ the binary tree structure and the pre-order traversal technique to update the secret keys for the client. We also develop a novel authenticator construction to support the forward security and the property of blockless verifiability. The security proof and the performance analysis show that our proposed protocol is secure and efficient.
(Show Context)

Citation Context

...hich allows the auditor to verify the integrity of the data in cloud without retrieving the whole data. Many cloud storage auditing protocols like [1–8] have been proposed based on this technique. The privacy protection of data is also an important aspect of cloud storage auditing. In order to reduce the computational burden of the client, a third-party auditor (TPA) is introduced to help the client to periodically check the integrity of the data in cloud. However, it is possible for the TPA to get the client’s data after it executes the auditing protocol multiple times. Auditing protocols in [9, 10] are designed to ensure the privacy of the client’s data in cloud. Another aspect having been addressed in cloud storage auditing is how to support data dynamic operations. Wang et al. [11] have proposed an auditing protocol supporting fully dynamic data operations including modification, insertion and deletion. Auditing protocols in [2, 9, 12, 13] can also support dynamic data operations. Other aspects, such as proxy auditing [14], user revocation [15] and eliminating certificate management [16] in cloud storage auditing have also been studied. Though many research works about cloud storage a...

UNIVERSITY OF BEIRA INTERIOR Engineering Secure and Efcient Storage of Multimedia Content in Public Cloud Environments Using Joint Compression and Encryption

by André Filipe, Prata Ferreira , 2013
"... ii Dissertation prepared at University of Beira Interior and at Instituto de Telecomunicações, within Multimedia Signal Processing – Covilhã Group, and submitted for defense in a public examination session at University of Beira Interior. ..."
Abstract - Add to MetaCart
ii Dissertation prepared at University of Beira Interior and at Instituto de Telecomunicações, within Multimedia Signal Processing – Covilhã Group, and submitted for defense in a public examination session at University of Beira Interior.
(Show Context)

Citation Context

...data in the cloud can be dynamically updated. Thus, an ef- cient and secure dynamic auditing protocol is desired to convince data owners that the data are correctly stored in the cloud. Yang and Jia =-=[58]-=-, design an auditing framework for cloud storage systems and propose an efcient and privacy-preserving auditing protocol. Then, extends the auditing protocol to support the data dynamic operations, w...

Effective Secure Storage and Retrieve In Cloud Computing

by Sudeepa R , Dr. H S Guruprasad Professor Head
"... Abstract-In Cloud computing, user can remotely store and retrieve their data based on-demand service, without the burden of local data storage and maintenance. However, the protection of the confidential data processed and generated during the computation is becoming the major security concern. The ..."
Abstract - Add to MetaCart
Abstract-In Cloud computing, user can remotely store and retrieve their data based on-demand service, without the burden of local data storage and maintenance. However, the protection of the confidential data processed and generated during the computation is becoming the major security concern. The main objective of cloud computing enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. The main concern of this paper is optimal storing, retrieval of data with effective security in cloud computing. The proposed methodology suggests the encryption of the files to be uploaded on the cloud. The integrity and confidentiality of the data uploaded by the user is ensured doubly by not only encrypting it but also providing access to the data only on successful authentication. The proposed system takes care of data security while it is in transit and also has mechanisms to support verification of data for correctness.

Auditability-Aware Data Scheduling for Privacy Preserved Third-party Auditing

by Suganya S , Suganya S , Uma A , Kumaresan M
"... Cloud Computing is one of the top technology concepts. It has many names, including: grid computing, utility computing, and on-demand computing. The term "cloud computing" has at its core a single element: computing services are delivered over the Internet, on demand, from a remote locati ..."
Abstract - Add to MetaCart
Cloud Computing is one of the top technology concepts. It has many names, including: grid computing, utility computing, and on-demand computing. The term "cloud computing" has at its core a single element: computing services are delivered over the Internet, on demand, from a remote location, rather that residing on one"s own desktop, laptop, mobile device or even on an organization"s servers. For organizations, this would mean that for a set or variable, usage-based fee or even possibly for free it would contract with a provider to deliver applications, computing power and storage via web. Cloud storage plays an important role in the technology buzz -cloud computing, in which clients can store their data at cloud servers and can be accessed anywhere, any time and on any devices. This opens up the threat on the data which client is storing on the cloud as it has to stored and accessed via Internet.

A SURVEY ON SECURED STORAGE OF DATA AND CONSEQUENT ISSUES IN CLOUD COMPUTING

by T Esther Dyana , S Maheswari
"... ABSTRACT The term cloud is analogical to the "Internet". The cloud is coming into sharper focus as more people adopt cloud services and gain experience that can be shared with others. As uses of cloud computing have extended, so has industry expertise in harnessing its prospective. In add ..."
Abstract - Add to MetaCart
ABSTRACT The term cloud is analogical to the "Internet". The cloud is coming into sharper focus as more people adopt cloud services and gain experience that can be shared with others. As uses of cloud computing have extended, so has industry expertise in harnessing its prospective. In addition to serving as an underlying infrastructural pillar of the internet, the cloud now supports a collection of services and applications. A number of benefits are regularly mentioned by cloud providers and customers, including reduced capital costs, economies of scale, time savings, flexibility, and scalability. Yet, organizations that consider cloud computing have also expressed a number of security concerns. In multiple studies over the past years, security and privacy are commonly cited as top concerns and the advantage of moving from single cloud to multiple clouds are analyzed and the comparison table of different cloud tools is studied in this paper.

Research Article Towards Dynamic Remote Data Auditing in Computational Clouds

by Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, Nor Badrul Anuar , 2014
"... Copyright © 2014 Mehdi Sookhak et al.This is an open access article distributed under the Creative CommonsAttribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Cloud computing is a significant shift of computa ..."
Abstract - Add to MetaCart
Copyright © 2014 Mehdi Sookhak et al.This is an open access article distributed under the Creative CommonsAttribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Cloud computing is a significant shift of computational paradigmwhere computing as a utility and storing data remotely have a great potential. Enterprise and businesses are nowmore interested in outsourcing their data to the cloud to lessen the burden of local data storage andmaintenance. However, the outsourced data and the computation outcomes are not continuously trustworthy due to the lack of control and physical possession of the data owners. To better streamline this issue, researchers have now focused on designing remote data auditing (RDA) techniques.Themajority of these techniques, however, are only applicable for static archive data and are not subject to audit the dynamically updated outsourced data.We propose an effectual RDA technique based on algebraic signature properties for cloud storage system and also present a new data structure capable of efficiently supporting dynamic data operations like append, insert, modify, and delete. Moreover, this data structure empowers our method to be applicable for large-scale data withminimum computation cost.The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server. 1.
(Show Context)

Citation Context

... or modify positions by following this sequence and computing the root in MHT. However, the method leaks the data content to the auditor and incurs heavy computation cost on the auditor. Yang and Jia =-=[17]-=- implemented an efficient data auditing scheme to overcome the privacy issue in [19]. The authors used the bilinearity property of the bilinear pairing for generating an encrypted proof such that the ...

Research Article A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

by Ohmin Kwon, Dongyoung Koo, Yongjoo Shin, Hyunsoo Yoon
"... Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and con ..."
Abstract - Add to MetaCart
Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage.The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. 1.
(Show Context)

Citation Context

...reserving manner. Privacy preservation means that the TPA cannot learn any information about the data during audit process. It was achieved through the methods of random masking [11] and bilinear map =-=[14]-=-. 3. Index Table Management Previous works [14–18] utilized an index table for efficient data updates. It is composed of indices which represent the sequences of data blocks and identifiers. The ident...

A Survey on the Architectures of Data Security in Cloud Storage Infrastructure

by T. Brindha, et al.
"... Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables ..."
Abstract - Add to MetaCart
Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data to the cloud in a rapid and secure manner. It assists activities and government agencies considerably decrease their economic overhead of data organization, as they can store their data endorsement vaguely to third-party cloud storage sources than preserving the data centers on their personal. Cloud storage allows users to accumulate their data at a remote location and have the on-demand high superiority cloud requests without the burden of restricted hardware and software organization. Along with the widespread benefits on cloud computing, however, security issues with cloud data storage are arising in terms of confidentiality, integrity and reliability. Although the profits are obvious, such a service is also turning down user’s corporeal control of their outsourced data, which unavoidably facades novel security dangers towards the accuracy of the data in cloud. This paper provides a comprehensive survey of major security issues that exists in cloud data storage. We also conduct extensive empirical studies and analysis of different techniques which provides security fortification for outsourced data in cloud computing environment.

engineering Academy Ambi,

by Vinod Bharat, Savitribai Phule Pune, Savitribai Phule Pune, Kishor Sawant, Savitribai Phule Pune, Savitribai Phule Pune
"... The cloud provides storage for user to store their data remotely. But there is a problem with the auditing protocol, which was proposed. There is a new paradigm of storage service, which makes the integrity protection for outsourced data. There are also other integrity auditing protocols that has be ..."
Abstract - Add to MetaCart
The cloud provides storage for user to store their data remotely. But there is a problem with the auditing protocol, which was proposed. There is a new paradigm of storage service, which makes the integrity protection for outsourced data. There are also other integrity auditing protocols that has been already proposed but their focus was singleton cloud storage. These protocols don’t support batch editing of cloud storage. There is a another auditing protocol for public which will provide integrity of multi-cloud storage. In this protocol there is a third party auditor which will simultaneously verify multiple auditing requests from different users on different storage of data files or different cloud storage servers. This protocol will achieve quick identification of corrupted data by implementing recoverable coding approach and homomorphicciphertext verification. It will also provide privacy preserving public auditing for data integrity. The total editing time can be reduced by batch auditing protocol and communication cost can be maintained low using same protocol. Analysis of extended security and performance shows this protocol is efficient and secure.
(Show Context)

Citation Context

...ansbe get handled in sequential queue or in the batch manner waysit will be the great efficient work. There are only severalsprotocols which handle the data integrity in the multi - cloudssystem [6], =-=[8]-=-. These kinds of protocols work efficientlyswhen the data of the particular user and the appropriate key issstored. If for any reason the data and key gets vanished thereswill be no use of such auditi...

Designing Efficient Security Technique for Data Storage in Cloud Computing

by Ingale Pragati Purushottam, V. M. Thakare
"... Cloud computing is an environment in which data owner move data from local system to cloud storage, next job of cloud service provider (CSP) to store that data and provide it to the user on their demand. In this simplest environment exist various security risk on cloud storage because it consist sen ..."
Abstract - Add to MetaCart
Cloud computing is an environment in which data owner move data from local system to cloud storage, next job of cloud service provider (CSP) to store that data and provide it to the user on their demand. In this simplest environment exist various security risk on cloud storage because it consist sensitive data of owner, sometime it may happened cloud services provide is dishonest. On the brief view it is clear there is various risk on cloud data storage. In this paper firstly introduce recycle storage method for reliability of data and for improving the performance and security concern proposed audit storage system. Index term- Cloud computing, security risk, recycle storage, audit storage. 1.
(Show Context)

Citation Context

...e (cloud storage)[3] or cloud service providescould dishonest. Data which is not access from long time,sCSP discarded data from storage system hide it from thesowner or shows lie data still available =-=[4]-=-. In this papersproposed recycle storage service, which access those dataswhich was discarded by CSP. Another concern with cloudsstorage is of security, here proposed audit storage to improvesthe perf...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University