An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing

被引:17
|
作者
Feng, Bin [1 ,2 ]
Ma, Xinzhu [1 ,2 ]
Guo, Cheng [1 ,2 ]
Shi, Hui [3 ]
Fu, Zhangjie [4 ]
Qiu, Tie [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China
[3] Liaoning Normal Univ, Network Informat Management Ctr, Dalian 116021, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
来源
IEEE ACCESS | 2016年 / 4卷
基金
美国国家科学基金会;
关键词
Cloud computing; storage security; provable data possession; bidirectional authentication;
D O I
10.1109/ACCESS.2016.2621005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.
引用
收藏
页码:7899 / 7911
页数:13
相关论文
共 50 条
  • [31] Efficient way to ensure the data security in cloud computing
    Pallikonda, Anil Kumar
    Chaduvula, Kavitha
    Markapudi, Baburao
    Jyothi, Ch Rathna
    Indira, D. N. V. S. L. S.
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2022, 15 (01): : 1 - 12
  • [32] FEATHER: A Proposed Lightweight Protocol for Mobile Cloud Computing Security
    Alamer, Ahmed
    Soh, Ben
    [J]. ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2020, 10 (04) : 6116 - 6125
  • [33] An efficient data integrity auditing protocol for cloud computing
    Garg, Neenu
    Bawa, Seema
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 306 - 316
  • [34] Membrane computing inspired protocol to enhance security in cloud network
    K. Maharajan
    B. Paramasivan
    [J]. The Journal of Supercomputing, 2019, 75 : 2181 - 2192
  • [35] Membrane computing inspired protocol to enhance security in cloud network
    Maharajan, K.
    Paramasivan, B.
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (04): : 2181 - 2192
  • [36] Trust Based Interoperability Security Protocol for Grid and Cloud Computing
    Rajagopal, R.
    Chitra, M.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [37] Efficient integrity verification of replicated data in cloud computing system
    Yi, Mingxu
    Wei, Jinxia
    Song, Lingwei
    [J]. COMPUTERS & SECURITY, 2017, 65 : 202 - 212
  • [38] PRIVACY PRESERVING FOR DATA STORAGE SECURITY IN HOSPITAL CLOUD COMPUTING
    Wang, Y. R.
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 106 - 107
  • [39] Enabling Data Storage Security in Cloud Computing for Banking Enterprise
    Biruntha, S.
    Kumar, V. Venkatesa
    Palaniswami, S.
    [J]. RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 217 - +
  • [40] On Massive Data Storage Security in Cloud Computing with RaptorQ codes
    Zhao, Na
    Zhang, Yu
    Xiong, Ke
    Liu, Tong
    [J]. PROCEEDINGS OF 2018 14TH IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP), 2018, : 758 - 761