Public Data Auditing with Constrained Auditing Number for Cloud Storage

被引:0
|
作者
Yang, Guangyang [1 ]
Xia, Hui [1 ]
Shen, Wenting [1 ]
Jiang, Xiuxiu [1 ]
Yu, Jia [1 ,2 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Prov Key Lab Comp Network, Jinan 250014, Peoples R China
关键词
Cloud storage; Data auditing; Constrained auditing number DDOS attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the popularity and the proliferation of cloud storage increase, data security is becoming one of the biggest concerns for users of cloud storage. How to preserve the data integrity, as one of the most important security aspects, has been a research hotspot in the field of cloud security. Many data auditing schemes for checking the data integrity have been presented, however; these schemes are based on the assumption that the third party auditor (TPA) is secure and trustworthy. If TPA becomes wicked, these schemes are easy to make cloud server suffer distributed denial-of-service (DDOS) attack. In order to deal with this problem, we propose an authorized auditing scheme with constrained auditing number in this paper In our scheme, only authorized TPA can make valid challenges to cloud for data integrity checking. Moreover; the total auditing number that an authorized TPA can make is decided by the user In our construction, a constrained auditing number is integrated into the authorization generated by user to achieve this property. Once the number of a TPA's auditing reaches the constraint, cloud server will not respond to this TPA's challenges, which literally rules out the threat of DDOS attack. Analysis and experimental results show the proposed scheme is secure and efficient.
引用
收藏
页码:21 / 32
页数:12
相关论文
共 50 条
  • [21] Secure public data auditing scheme for cloud storage in smart city
    Libing Wu
    Jing Wang
    Neeraj Kumar
    Debiao He
    Personal and Ubiquitous Computing, 2017, 21 : 949 - 962
  • [22] Using Blockchain for Data Auditing in Cloud Storage
    Li, Chunhua
    Hu, Jiaqi
    Zhou, Ke
    Wang, Yuanzhang
    Deng, Hongyu
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 335 - 345
  • [23] Certificateless Public Auditing for Data Integrity in the Cloud
    Wang, Boyang
    Li, Baochun
    Li, Hui
    Li, Fenghua
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 136 - 144
  • [24] Secure and Efficient Public Auditing scheme for Cloud Storage
    More, Swapnali S.
    Chaudhari, Sangita S.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 439 - 444
  • [25] Third Party Public Auditing scheme for Cloud Storage
    More, Swapnali
    Chaudhari, Sangita
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 69 - 76
  • [26] An efficient certificateless public auditing scheme in cloud storage
    Gao, Gaimei
    Fei, Hongxia
    Qin, Zefeng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (24):
  • [27] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [28] Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service
    Hwang, Min-Shiang
    Sun, Tsuei-Hung
    Lee, Cheng-Chi
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2017, 26 (05)
  • [29] An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing
    Yu, Han
    Lu, Xiuqing
    Pan, Zhenkuan
    IEEE ACCESS, 2020, 8 (08): : 151465 - 151473
  • [30] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021