Public Data Auditing with Constrained Auditing Number for Cloud Storage

被引:0
|
作者
Yang, Guangyang [1 ]
Xia, Hui [1 ]
Shen, Wenting [1 ]
Jiang, Xiuxiu [1 ]
Yu, Jia [1 ,2 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Prov Key Lab Comp Network, Jinan 250014, Peoples R China
关键词
Cloud storage; Data auditing; Constrained auditing number DDOS attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the popularity and the proliferation of cloud storage increase, data security is becoming one of the biggest concerns for users of cloud storage. How to preserve the data integrity, as one of the most important security aspects, has been a research hotspot in the field of cloud security. Many data auditing schemes for checking the data integrity have been presented, however; these schemes are based on the assumption that the third party auditor (TPA) is secure and trustworthy. If TPA becomes wicked, these schemes are easy to make cloud server suffer distributed denial-of-service (DDOS) attack. In order to deal with this problem, we propose an authorized auditing scheme with constrained auditing number in this paper In our scheme, only authorized TPA can make valid challenges to cloud for data integrity checking. Moreover; the total auditing number that an authorized TPA can make is decided by the user In our construction, a constrained auditing number is integrated into the authorization generated by user to achieve this property. Once the number of a TPA's auditing reaches the constraint, cloud server will not respond to this TPA's challenges, which literally rules out the threat of DDOS attack. Analysis and experimental results show the proposed scheme is secure and efficient.
引用
收藏
页码:21 / 32
页数:12
相关论文
共 50 条
  • [1] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173
  • [2] A public cloud storage auditing scheme for resource-constrained clients
    Shen W.
    Yu J.
    Hao R.
    Wang X.
    Yu, Jia (qduyujia@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (06): : 121 - 130
  • [3] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [4] Division and Replication for data with public auditing scheme for cloud storage
    Salunkhe, Sujata D.
    Patil, Dhanshri
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [5] Mutual Verifiable Provable Data Auditing in Public Cloud Storage
    Ren, Yongjun
    Shen, Jian
    Wang, Jin
    Han, Jin
    Lee, Sungyoung
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (02): : 317 - 323
  • [6] A survey of public auditing for secure data storage in cloud computing
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [7] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700
  • [8] Public Auditing for Big Data Storage in Cloud Computing -- A Survey
    Liu, Chang
    Ranjan, Rajiv
    Zhang, Xuyun
    Yang, Chi
    Georgakopoulos, Dimitrios
    Chen, Jinjun
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 1128 - 1135
  • [9] Public Auditing for Trusted Cloud Storage Services
    Tian, Hui
    Chen, Yuxiang
    Jiang, Hong
    Huang, Yongfeng
    Nan, Fulin
    Chen, Yonghong
    IEEE SECURITY & PRIVACY, 2019, 17 (01) : 10 - 22
  • [10] Revocable and certificateless public auditing for cloud storage
    Yinghui ZHANG
    Tiantian ZHANG
    Shengmin XU
    Guowen XU
    Dong ZHENG
    Science China(Information Sciences), 2020, 63 (10) : 282 - 284