Public Data Auditing with Constrained Auditing Number for Cloud Storage

被引:0
|
作者
Yang, Guangyang [1 ]
Xia, Hui [1 ]
Shen, Wenting [1 ]
Jiang, Xiuxiu [1 ]
Yu, Jia [1 ,2 ]
机构
[1] Qingdao Univ, Coll Informat Engn, Qingdao 266071, Peoples R China
[2] Shandong Prov Key Lab Comp Network, Jinan 250014, Peoples R China
关键词
Cloud storage; Data auditing; Constrained auditing number DDOS attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the popularity and the proliferation of cloud storage increase, data security is becoming one of the biggest concerns for users of cloud storage. How to preserve the data integrity, as one of the most important security aspects, has been a research hotspot in the field of cloud security. Many data auditing schemes for checking the data integrity have been presented, however; these schemes are based on the assumption that the third party auditor (TPA) is secure and trustworthy. If TPA becomes wicked, these schemes are easy to make cloud server suffer distributed denial-of-service (DDOS) attack. In order to deal with this problem, we propose an authorized auditing scheme with constrained auditing number in this paper In our scheme, only authorized TPA can make valid challenges to cloud for data integrity checking. Moreover; the total auditing number that an authorized TPA can make is decided by the user In our construction, a constrained auditing number is integrated into the authorization generated by user to achieve this property. Once the number of a TPA's auditing reaches the constraint, cloud server will not respond to this TPA's challenges, which literally rules out the threat of DDOS attack. Analysis and experimental results show the proposed scheme is secure and efficient.
引用
收藏
页码:21 / 32
页数:12
相关论文
共 50 条
  • [41] A decentralized data integrity auditing scheme for cloud storage
    Liu, Jiaxian
    Huang, Hui
    Chen, Qunshan
    Huang, Zhenjie
    2023 INTERNATIONAL CONFERENCE ON DATA SECURITY AND PRIVACY PROTECTION, DSPP, 2023, : 190 - 198
  • [42] Dynamic and Public Auditing with Fair Arbitration for Cloud Data
    Jin, Hao
    Jiang, Hong
    Zhou, Ke
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (03) : 680 - 693
  • [43] Public Auditing Scheme for Cloud Data Integrity Verification
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 237 - 246
  • [44] Public integrity auditing for shared dynamic cloud data
    Singh, Shubham
    Thokchom, Surmila
    6TH INTERNATIONAL CONFERENCE ON SMART COMPUTING AND COMMUNICATIONS, 2018, 125 : 698 - 708
  • [45] Preserving Privacy in Public Auditing for Shared Cloud Data
    Anjali, R. S.
    Ravikumar, Aswathy
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 11 - 16
  • [46] An improved public auditing protocol for cloud storage integrity checking
    Zhang, Jindan
    Wang, Baocang
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2019, 15 (03) : 282 - 303
  • [47] Blockchain-Based Decentralized Public Auditing for Cloud Storage
    Shu, Jiangang
    Zou, Xing
    Jia, Xiaohua
    Zhang, Weizhe
    Xie, Ruitao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2366 - 2380
  • [48] Public cloud object storage auditing: Design, implementation, and analysis
    Chen, Fei
    Meng, Fengming
    Li, Zhipeng
    Li, Li
    Xiang, Tao
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 189
  • [49] Ensure Cloud Storage Correctness Based on Public Auditing Mechanism
    Priya, K.
    Gunavathi, I
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1468 - 1472
  • [50] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241