SecACS: Enabling lightweight secure auditable cloud storage with data dynamics

被引:3
|
作者
Li, Li [1 ,2 ]
Liu, Jiayong [1 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu, Sichuan, Peoples R China
[2] Chongqing Univ Educ, Sch Math & Informat Engn, Chongqing, Peoples R China
关键词
Secure auditable cloud storage; Data integrity; Lightweight; Data dynamics;
D O I
10.1016/j.jisa.2020.102545
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of cloud computing and IoT, consistently increasing data brings us a great burden to store locally. Due to the local limited storage capacity and expensive maintenance cost, individuals and enterprises are preferred to outsource their data to the public commercial cloud (e.g., Google Drive and Dropbox). However, the commercial cloud can not be fully trusted because data on the cloud may be modified by various reasons (e.g., outside hackers' attacks, hardware or software failures). To ensure data integrity, one of the most popular techniques is secure cloud storage (SCS). Nevertheless, traditional solutions of SCS with heavy cryptographic operations make data outsourcing computationally complicated. Moreover, most proposed approaches only focus on verifying data integrity while neglecting the functionality of data dynamics. To address these issues, we propose a Secure Auditable Cloud Storage (SecACS) scheme supporting data dynamics. SecACS requires less computation time by employing lightweight cryptographic operations. Compared to the previous solutions, the extensive experimental results demonstrate that SecACS achieves one order of magnitude faster in outsourcing data and twice faster in checking data integrity. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] A Secure Architecture for Data Storage in the Cloud Environments
    Fu, Chuan
    Yang, Jun
    Liu, Zheli
    Jia, Chunfu
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 289 - 291
  • [42] Secure data storage in the cloud with homomorphic encryption
    Bensitel, Yasmina
    Romadi, Rahal
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 1 - 6
  • [43] Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
    Liu, Jia-Nan
    Luo, Xizhao
    Weng, Jian
    Yang, Anjia
    Wang, Xu An
    Li, Ming
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1518 - 1531
  • [44] Lightweight secure storage model with fault-tolerance in cloud environment
    Ahmed, Muhra
    Vu, Quang Hieu
    Asal, Rasool
    Al Muhairi, Hassan
    Yeun, Chan Yeob
    [J]. ELECTRONIC COMMERCE RESEARCH, 2014, 14 (03) : 271 - 291
  • [45] Lightweight secure storage model with fault-tolerance in cloud environment
    Muhra Ahmed
    Quang Hieu Vu
    Rasool Asal
    Hassan Al Muhairi
    Chan Yeob Yeun
    [J]. Electronic Commerce Research, 2014, 14 : 271 - 291
  • [46] Digital provenance: Enabling secure data forensics in cloud computing
    Li, Jin
    Chen, Xiaofeng
    Huang, Qiong
    Wong, Duncan S.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 37 : 259 - 266
  • [47] Enabling Generic, Verifiable, and Secure Data Search in Cloud Services
    Zhu, Jie
    Li, Qi
    Wang, Cong
    Yuan, Xingliang
    Wang, Qian
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2018, 29 (08) : 1721 - 1735
  • [48] Enabling Interactive Analytics of Secure Data using Cloud Kotta
    Babuji, Yadu N.
    Chard, Kyle
    Duede, Eamon
    [J]. SCIENCECLOUD'17: PROCEEDINGS OF THE 8TH WORKSHOP ON SCIENTIFIC CLOUD COMPUTING, 2017, : 9 - 15
  • [49] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357
  • [50] An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 110 - 117