An efficient data integrity auditing protocol for cloud computing

被引:44
|
作者
Garg, Neenu [1 ]
Bawa, Seema [1 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Data integrity; Cloud security; Third party auditing; Data integrity auditing; 3-FACTOR USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; KEYWORD SEARCH; SCHEME; PRIVACY;
D O I
10.1016/j.future.2020.03.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud data storage has brought a revolution in Information Technology (IT) sector with its inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing data on cloud servers, users can reduce the hardware expenditures and can simplify the data management process. A Cloud Service Provider (CSP) is responsible for offering secure data storage services. However, using these services in a secured manner and ensuring data integrity in these remote cloud servers remains to be an issue for the clients. In this paper, we propose an efficient approach for data integrity auditing in cloud computing. The objective of proposed protocol is to minimize the computational complexity of client during system setup phase of the auditing protocol. Based on the properties of bilinear pairings, the proposed protocol is publicly verifiable and supports dynamic operations on data. The security of proposed protocol relies on the stability of Computational Diffie Hellman Problem (CDHP) in a Random Oracle Model (ROM). Finally, the performance of proposed protocol has been evaluated by implementing a prototype of the protocol and conducting experiments. The results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:306 / 316
页数:11
相关论文
共 50 条
  • [1] Provable Cloud Data Transfer with Efficient Integrity Auditing for Cloud Computing
    Yang, Changsong
    Xiao, Jun
    Liu, Yueling
    Liu, Yang
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [2] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [3] Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    He, Debiao
    Huang, Xinyi
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (02): : 161 - 173
  • [4] Public Integrity Auditing for Shared Data with Efficient and Secure User Revocation in Cloud Computing
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 588 - 593
  • [5] Efficient public integrity auditing with secure deduplication in cloud computing
    Huo, Huixia
    Jiang, Tao
    Tan, Shichong
    Tao, Xiaoling
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 764 - 777
  • [6] Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing
    Ramaiah, Y. Govinda
    Kumari, G. Vijaya
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1559 - 1566
  • [7] An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs
    Li, Yumei
    Zhang, Futai
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 11513 - 11523
  • [8] A Survey on Data Auditing Approaches to Preserve Privacy and Data Integrity in Cloud Computing
    Kavya, V
    Sumathi, R.
    Shwetha, A. N.
    [J]. SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 108 - 118
  • [9] An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing
    Liu, Meng
    Wang, Xuan
    Yang, Chi
    Jiang, Zoe Lin
    Li, Ye
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (01):
  • [10] A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing
    Hiremath, Shivarajkumar
    Kunte, Sanjeev
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 306 - 310