An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing

被引:17
|
作者
Feng, Bin [1 ,2 ]
Ma, Xinzhu [1 ,2 ]
Guo, Cheng [1 ,2 ]
Shi, Hui [3 ]
Fu, Zhangjie [4 ]
Qiu, Tie [1 ,2 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China
[2] Key Lab Ubiquitous Network & Serv Software Liaoni, Dalian 116620, Peoples R China
[3] Liaoning Normal Univ, Network Informat Management Ctr, Dalian 116021, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
来源
IEEE ACCESS | 2016年 / 4卷
基金
美国国家科学基金会;
关键词
Cloud computing; storage security; provable data possession; bidirectional authentication;
D O I
10.1109/ACCESS.2016.2621005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.
引用
收藏
页码:7899 / 7911
页数:13
相关论文
共 50 条
  • [41] PRIVACY PRESERVING FOR DATA STORAGE SECURITY IN HOSPITAL CLOUD COMPUTING
    Wang, Y. R.
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 106 - 107
  • [42] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [43] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 75 - 82
  • [44] Security storage of sensitive information in cloud computing data center
    Li Z.
    Wang J.
    [J]. International Journal of Performability Engineering, 2019, 15 (03) : 1023 - 1032
  • [45] Data Storage Security in Cloud Computing Using Container Clustering
    Gupta, Rohan Raj
    Mishra, Gaurav
    Katara, Subham
    Agarwal, Arpit
    Sarkar, Mrinal Kanti
    Das, Rupayan
    Kumar, Sanjay
    [J]. 2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [46] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 61 - 67
  • [47] Security and Efficiency Trade-offs for Cloud Computing and Storage
    Li, Jian
    Zhou, Kai
    Ren, Jian
    [J]. 2015 RESILIENCE WEEK (RSW), 2015, : 148 - 153
  • [48] An Efficient Auditing Scheme for Data Storage Security in Cloud
    Agarkhed, Jayashree
    Ashalatha, R.
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [49] HASG: Security and Efficient Frame for Accessing Cloud Storage
    Liu, Shenling
    Zhang, Chunyuan
    Chen, Yujiao
    [J]. CHINA COMMUNICATIONS, 2018, 15 (01) : 86 - 94
  • [50] Efficient Cloud Storage Confidentiality to Ensure Data Security
    Arockiam, L.
    Monikandan, S.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,