An efficient data integrity auditing protocol for cloud computing

被引:44
|
作者
Garg, Neenu [1 ]
Bawa, Seema [1 ]
Kumar, Neeraj [1 ]
机构
[1] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Data integrity; Cloud security; Third party auditing; Data integrity auditing; 3-FACTOR USER AUTHENTICATION; KEY AGREEMENT PROTOCOL; KEYWORD SEARCH; SCHEME; PRIVACY;
D O I
10.1016/j.future.2020.03.032
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud data storage has brought a revolution in Information Technology (IT) sector with its inherent benefits like ease of use, cost efficiency, location independence etc. By outsourcing data on cloud servers, users can reduce the hardware expenditures and can simplify the data management process. A Cloud Service Provider (CSP) is responsible for offering secure data storage services. However, using these services in a secured manner and ensuring data integrity in these remote cloud servers remains to be an issue for the clients. In this paper, we propose an efficient approach for data integrity auditing in cloud computing. The objective of proposed protocol is to minimize the computational complexity of client during system setup phase of the auditing protocol. Based on the properties of bilinear pairings, the proposed protocol is publicly verifiable and supports dynamic operations on data. The security of proposed protocol relies on the stability of Computational Diffie Hellman Problem (CDHP) in a Random Oracle Model (ROM). Finally, the performance of proposed protocol has been evaluated by implementing a prototype of the protocol and conducting experiments. The results obtained have been compared with state-of-the-art protocols and demonstrates the high efficiency and adaptability of proposed protocol by clients with limited resources. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:306 / 316
页数:11
相关论文
共 50 条
  • [41] ANALYSIS AND DESIGN OF AN OPTIMIZED SECURE AUDITING PROTOCOL FOR STORING DATA DYNAMICALLY IN CLOUD COMPUTING
    Kumar, Raman
    Singh, Gurpreet
    [J]. MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 1037 - 1047
  • [42] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    [J]. 2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [43] An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR
    Zhou, Lei
    Fu, Anmin
    Feng, Jingyu
    Zhou, Chunyi
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [44] Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit
    Li, Ruifeng
    Wang, Xu An
    Yang, Haibin
    Niu, Ke
    Tang, Dianhua
    Yang, Xiaoyuan
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 8079 - 8089
  • [45] Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing
    Chen, Wenqi
    Tian, Hui
    Chang, Chin-Chen
    Nan, Fulin
    Lu, Jing
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [46] An Efficient Cloud Auditing Scheme for Data Integrity and Identity-Privacy of Multiple Uploaders
    Al-Odat, Zeyad
    Khan, Samee
    [J]. 2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 8 - 13
  • [47] Secure and Efficient Data Integrity Based on Iris Features in Cloud Computing
    Abbdal, Salah H.
    Jin, Hai
    Zou, Deqing
    Yassin, Ali A.
    [J]. 2014 7TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2014, : 3 - 6
  • [48] Public Auditing Scheme for Cloud Data Integrity Verification
    Hiremath, Shivarajkumar
    Kunte, R. Sanjeev
    [J]. INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 237 - 246
  • [49] Comparative analysis of cloud data integrity auditing protocols
    Garg, Neenu
    Bawa, Seema
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 17 - 32
  • [50] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):