SecACS: Enabling lightweight secure auditable cloud storage with data dynamics

被引:3
|
作者
Li, Li [1 ,2 ]
Liu, Jiayong [1 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu, Sichuan, Peoples R China
[2] Chongqing Univ Educ, Sch Math & Informat Engn, Chongqing, Peoples R China
关键词
Secure auditable cloud storage; Data integrity; Lightweight; Data dynamics;
D O I
10.1016/j.jisa.2020.102545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of cloud computing and IoT, consistently increasing data brings us a great burden to store locally. Due to the local limited storage capacity and expensive maintenance cost, individuals and enterprises are preferred to outsource their data to the public commercial cloud (e.g., Google Drive and Dropbox). However, the commercial cloud can not be fully trusted because data on the cloud may be modified by various reasons (e.g., outside hackers' attacks, hardware or software failures). To ensure data integrity, one of the most popular techniques is secure cloud storage (SCS). Nevertheless, traditional solutions of SCS with heavy cryptographic operations make data outsourcing computationally complicated. Moreover, most proposed approaches only focus on verifying data integrity while neglecting the functionality of data dynamics. To address these issues, we propose a Secure Auditable Cloud Storage (SecACS) scheme supporting data dynamics. SecACS requires less computation time by employing lightweight cryptographic operations. Compared to the previous solutions, the extensive experimental results demonstrate that SecACS achieves one order of magnitude faster in outsourcing data and twice faster in checking data integrity. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
    Yang, Anjia
    Xu, Jia
    Weng, Jian
    Zhou, Jianying
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (01) : 212 - 225
  • [22] Comment on "A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage"
    Chang, Jinyong
    Shao, Bilin
    Ji, Yanyan
    Bian, Genqing
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (05) : 2633 - 2634
  • [23] Secure storage of data in cloud computing
    20150500466883
    [J]. (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [24] A Secure Data Forwarding In Cloud Storage
    Prabha, K.
    Nalini, S.
    [J]. 2013 INTERNATIONAL CONFERENCE ON OPTICAL IMAGING SENSOR AND SECURITY (ICOSS 2013), 2013,
  • [25] Techniques of secure storage for cloud data
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (01): : 150 - 163
  • [26] Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
    Tang, Heyi
    Cui, Yong
    Guan, Chaowen
    Wu, Jianping
    Weng, Jian
    Ren, Kui
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 59 - 70
  • [27] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Hou, Huiying
    Yu, Jia
    Zhang, Hanlin
    Xu, Yan
    Hao, Rong
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (04): : 1849 - 1863
  • [28] Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
    Huiying Hou
    Jia Yu
    Hanlin Zhang
    Yan Xu
    Rong Hao
    [J]. Cluster Computing, 2018, 21 : 1849 - 1863
  • [29] Enabling efficient and secure data sharing in cloud computing
    Li, Jingwei
    Li, Jin
    Liu, Zheli
    Jia, Chunfu
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1052 - 1066
  • [30] A Secure and LightWeight Approach for Critical Data Security in Cloud
    Gupta, Sanchika
    Sardana, Anjali
    Kumar, Padam
    Abraham, Ajith
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 315 - 320