An efficient data integrity auditing protocol for cloud computing

被引:46
|
作者
Garg, Neenu [1 ]
Bawa, Seema [1 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Data integrity; Cloud security; Third party auditing; Data integrity auditing; 3-FACTOR USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; KEYWORD SEARCH; SCHEME; PRIVACY;
D O I
10.1016/j.future.2020.03.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud data storage has brought a revolution in Information Technology (IT) sector with its inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing data on cloud servers, users can reduce the hardware expenditures and can simplify the data management process. A Cloud Service Provider (CSP) is responsible for offering secure data storage services. However, using these services in a secured manner and ensuring data integrity in these remote cloud servers remains to be an issue for the clients. In this paper, we propose an efficient approach for data integrity auditing in cloud computing. The objective of proposed protocol is to minimize the computational complexity of client during system setup phase of the auditing protocol. Based on the properties of bilinear pairings, the proposed protocol is publicly verifiable and supports dynamic operations on data. The security of proposed protocol relies on the stability of Computational Diffie Hellman Problem (CDHP) in a Random Oracle Model (ROM). Finally, the performance of proposed protocol has been evaluated by implementing a prototype of the protocol and conducting experiments. The results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:306 / 316
页数:11
相关论文
共 50 条
  • [41] On the Security of a Public Auditing Protocol for Shared Data with Efficient User Revocation in the Cloud
    Ma, FangChao
    Li, Hechao
    Guo, Hua
    Xia, ChunHe
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1647 - 1655
  • [42] ANALYSIS AND DESIGN OF AN OPTIMIZED SECURE AUDITING PROTOCOL FOR STORING DATA DYNAMICALLY IN CLOUD COMPUTING
    Kumar, Raman
    Singh, Gurpreet
    MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 1037 - 1047
  • [43] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [44] An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR
    Zhou, Lei
    Fu, Anmin
    Feng, Jingyu
    Zhou, Chunyi
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [45] Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit
    Li, Ruifeng
    Wang, Xu An
    Yang, Haibin
    Niu, Ke
    Tang, Dianhua
    Yang, Xiaoyuan
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8079 - 8089
  • [46] Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing
    Chen, Wenqi
    Tian, Hui
    Chang, Chin-Chen
    Nan, Fulin
    Lu, Jing
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [47] An Efficient Cloud Auditing Scheme for Data Integrity and Identity-Privacy of Multiple Uploaders
    Al-Odat, Zeyad
    Khan, Samee
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 8 - 13
  • [48] Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing
    Abbdal, Salah H.
    Jin, Hai
    Zou, Deqing
    Yassin, Ali A.
    2014 7TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2014, : 3 - 6
  • [49] Public Auditing Scheme for Cloud Data Integrity Verification
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 237 - 246
  • [50] Comparative analysis of cloud data integrity auditing protocols
    Garg, Neenu
    Bawa, Seema
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 17 - 32