Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources

被引:12
|
作者
Chandrasekhar, Santosh [1 ]
Singhal, Mukesh [1 ]
机构
[1] Univ Calif, Dept Elect Engn & Comp Sci, Merced, CA 95343 USA
关键词
Cloud-based storage systems; query authentication; multi-trapdoor hash functions; aggregate authentication tags; discrete log; INTEGRITY;
D O I
10.1109/TSC.2015.2500568
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Storage services are among the primary cloud computing offerings, providing advantages of scale, cost and availability to its customers. However, studies and past experiences show that large-scale storage service can be unreliable, and vulnerable to various internal and external threats that cause loss and/or corruption of customer data. In this work, we present a query authentication scheme for cloud-based storage system where the data is populated by multiple sources and retrieved by the clients. The system allows clients to verify the authenticity and integrity of the retrieved data in a scalable and efficient way, without requiring implicit trust on the storage service provider. The proposed mechanism is based on our recently proposed multi-trapdoor hash functions, using its properties to achieve near constant communication and computation overhead for authenticating query responses, regardless of the data size, or the number of sources. We develop a discrete log-based instantiation of the scheme and evaluate its security and performance. Our security analysis shows that forging the individual or aggregate authentication tags is infeasible under the discrete log assumption. Our performance evaluation demonstrates that the proposed scheme achieves superior efficiency and scalability compared to existing query authentication schemes offering support for multiple sources.
引用
收藏
页码:520 / 533
页数:14
相关论文
共 50 条
  • [1] Scalable Cloud-Based Data Storage Platform for Smart Grid
    Shwe, Hnin Yu
    Hee, Soong Boon
    Chong, Peter Han Joo
    [J]. SMART GRID INSPIRED FUTURE TECHNOLOGIES, 2017, 203 : 259 - 265
  • [2] Towards a Scalable Cloud-based RDF Storage Offering a Pub/Sub Query Service
    Pellegrino, Laurent
    Baude, Francoise
    Alshabani, Iyad
    [J]. THIRD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION (CLOUD COMPUTING 2012), 2012, : 243 - 246
  • [3] A New Authentication Scheme for Cloud-based Storage Applications
    Medhioub, Manel
    Hamdi, Mohamed
    Kim, Tai-Hoon
    [J]. SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 57 - 60
  • [4] Query Authentication over Cloud Data from Multiple Contributors
    Xie, Ge
    Peng, Zhiyong
    Song, Wei
    [J]. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, 2014, 8709 : 469 - 477
  • [5] A novel protocol for efficient authentication in cloud-based IoT devices
    Alam, Irfan
    Kumar, Manoj
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (10) : 13823 - 13843
  • [6] A novel protocol for efficient authentication in cloud-based IoT devices
    Irfan Alam
    Manoj Kumar
    [J]. Multimedia Tools and Applications, 2022, 81 : 13823 - 13843
  • [7] Cloud-based RFID Authentication
    Xie, Wei
    Xie, Lei
    Zhang, Chen
    Zhang, Quan
    Tang, Chaojing
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID (RFID), 2013, : 168 - 175
  • [8] Cloud-based human authentication through scalable multibiometric image sensor fusion
    Amin, Parag
    Bhuvana, J.
    Patel, Warish
    Saxena, Ashendra Kumar
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024,
  • [9] SUAS: Scalable User Authentication Scheme for Secure Accessing to Cloud-Based Environments
    Moghaddam, Faraz Fatemi
    Ravan, Rama Roshan
    Khodadadi, Touraj
    Javadianasl, Yashar
    Halalzadeh, Abbasali
    [J]. 2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [10] Cloud-based query evaluation for energy-efficient mobile sensing
    Mo, Tianli
    Lim, Lipyeow
    Sen, Sougata
    Misra, Archan
    Balan, Rajesh Krishna
    Lee, Youngki
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 38 : 257 - 274