Public Data Auditing with Constrained Auditing Number for Cloud Storage

被引:0
|
作者
Yang, Guangyang [1 ]
Xia, Hui [1 ]
Shen, Wenting [1 ]
Jiang, Xiuxiu [1 ]
Yu, Jia [1 ,2 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Prov Key Lab Comp Network, Jinan 250014, Peoples R China
关键词
Cloud storage; Data auditing; Constrained auditing number DDOS attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the popularity and the proliferation of cloud storage increase, data security is becoming one of the biggest concerns for users of cloud storage. How to preserve the data integrity, as one of the most important security aspects, has been a research hotspot in the field of cloud security. Many data auditing schemes for checking the data integrity have been presented, however; these schemes are based on the assumption that the third party auditor (TPA) is secure and trustworthy. If TPA becomes wicked, these schemes are easy to make cloud server suffer distributed denial-of-service (DDOS) attack. In order to deal with this problem, we propose an authorized auditing scheme with constrained auditing number in this paper In our scheme, only authorized TPA can make valid challenges to cloud for data integrity checking. Moreover; the total auditing number that an authorized TPA can make is decided by the user In our construction, a constrained auditing number is integrated into the authorization generated by user to achieve this property. Once the number of a TPA's auditing reaches the constraint, cloud server will not respond to this TPA's challenges, which literally rules out the threat of DDOS attack. Analysis and experimental results show the proposed scheme is secure and efficient.
引用
收藏
页码:21 / 32
页数:12
相关论文
共 50 条
  • [31] Efficient ID-based public auditing for the outsourced data in cloud storage
    Zhang, Jianhong
    Dong, Qiaocui
    INFORMATION SCIENCES, 2016, 343 : 1 - 14
  • [32] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [33] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [34] Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing
    Xu, Yan
    Ding, Ran
    Cui, Jie
    Zhong, Hong
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 399 - 416
  • [35] Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group
    Han, Chunxia
    Wang, Linjie
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [36] Public Auditing for Encrypted Data with Client-Side Deduplication in Cloud Storage
    HE Kai
    HUANG Chuanhe
    ZHOU Hao
    SHI Jiaoli
    WANG Xiaomao
    DAN Feng
    Wuhan University Journal of Natural Sciences, 2015, 20 (04) : 291 - 298
  • [37] Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage
    Wang, Feng
    Xu, Li
    Li, Jiguo
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2704 - 2716
  • [38] An Efficient Auditing Scheme for Data Storage Security in Cloud
    Agarkhed, Jayashree
    Ashalatha, R.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [39] Hash function design for cloud storage data auditing
    Doukas, Nikolaos
    Markovskyi, Oleksandr P.
    Bardis, Nikolaos G.
    THEORETICAL COMPUTER SCIENCE, 2019, 800 : 42 - 51
  • [40] On the Security of a Cloud Data Storage Auditing Protocol IPAD
    Wang, Xu An
    Luo, Xiaoshuang
    Zhang, Jindan
    Yang, Xiaoyuan
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 611 - 617