An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing

被引:17
|
作者
Feng, Bin [1 ,2 ]
Ma, Xinzhu [1 ,2 ]
Guo, Cheng [1 ,2 ]
Shi, Hui [3 ]
Fu, Zhangjie [4 ]
Qiu, Tie [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China
[3] Liaoning Normal Univ, Network Informat Management Ctr, Dalian 116021, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
来源
IEEE ACCESS | 2016年 / 4卷
基金
美国国家科学基金会;
关键词
Cloud computing; storage security; provable data possession; bidirectional authentication;
D O I
10.1109/ACCESS.2016.2621005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.
引用
收藏
页码:7899 / 7911
页数:13
相关论文
共 50 条
  • [1] An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
    Kumar, Syam P.
    Subramanian, R.
    Selvam, Thamizh D.
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 214 - 219
  • [2] Homomorpic Distributed Verification Protocol for Ensuring Data Storage Security in Cloud Computing
    Kumar, P. Syam
    Subramanian, R.
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (10): : 3465 - 3476
  • [3] On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage
    Ni, Jianbing
    Yu, Yong
    Mu, Yi
    Xia, Qi
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (10) : 2760 - 2761
  • [4] Bidirectional data verification for cloud storage
    Husain, Mohammad Iftekhar
    Ko, Steven Y.
    Uurtamo, Steve
    Rudra, Atri
    Sridhar, Ramalingam
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 45 : 96 - 107
  • [5] An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
    Yang, Kan
    Jia, Xiaohua
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (09) : 1717 - 1726
  • [6] Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing
    Xu, Chunxiang
    He, Xiaohu
    Abraha-Weldemariam, Daniel
    [J]. INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 422 - 428
  • [7] Vulnerabilities and storage security in Cloud Computing
    Derfouf, Mostapha
    Mimouni, Amina
    Eleuldj, Mohsine
    [J]. 2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 295 - 299
  • [8] A Framework for Storage Security in Cloud Computing
    Chen, Guoyou
    Miao, Jiajia
    Xie, Feng
    Mao, Handong
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1767 - +
  • [9] A Higher Level Security Protocol for Cloud Computing
    Celiktas, Baris
    Celikbilek, Ibrahim
    Ozdemir, Enver
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 97 - 101
  • [10] An Effective Security Comparison Protocol in Cloud Computing
    Chen, Yuling
    Tao, Junhong
    Li, Tao
    Cai, Jiangyuan
    Ren, Xiaojun
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 5141 - 5158