Efficient Privacy Preserving Integrity Checking Model for Cloud Data Storage Security

被引:0
|
作者
Subha, T. [1 ,2 ]
Jayashri, S. [3 ]
机构
[1] Sri Sai Ram Engn Coll, Kovur, India
[2] Anna Univ, Madras, Tamil Nadu, India
[3] Adhiparasakthi Engn Coll, Melmaruvathur, India
关键词
Auditing; cloud storage; data; integrity; privacy preserving; TTPA; Security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed when the data is maintained by third party service provider in cloud. The auditor is introduced to audit the integrity of the data on behalf of the client in order to ensure integrity of data. This can be called as public auditability of data. Recently, two privacy preserving auditing mechanisms named Oruta and Knox are introduced to check the correctness of stored data. In this paper, we try to propose the security flaw of their scheme when active adversaries are involved in cloud storage. An active adversary is capable of modifying the data stored in cloud arbitrarily. This data modification is not being identified by the user and the auditor in the verification process. We try to suggest a solution to resolve this flaw by signing the proof response generated on the cloud server side. Then the signed proof is sent to the trusted third party auditor (TTPA) for verification. The auditor first verifies the signature and for the validation of the proof. The proposed scheme is proved to be secure against active adversary.
引用
收藏
页码:55 / 60
页数:6
相关论文
共 50 条
  • [1] A Wew Remote Data Integrity Checking Scheme for Cloud storage With Privacy Preserving
    Yan, Xiangtao
    Li, Yifa
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 704 - 708
  • [2] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [3] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [4] Privacy preserving and public auditable integrity checking on dynamic Cloud data
    Thokchom, Surmila
    Saikia, Dilip Kr.
    [J]. International Journal of Network Security, 2019, 21 (02): : 221 - 229
  • [5] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Yanyan Ji
    Bilin Shao
    Jinyong Chang
    Genqing Bian
    [J]. Cluster Computing, 2022, 25 : 337 - 349
  • [6] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 337 - 349
  • [7] Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    [J]. Cluster Computing, 2022, 25 (01) : 337 - 349
  • [8] EPPDP: An Efficient Privacy-Preserving Data Possession With Provable Security in Cloud Storage
    Dhakad, Nandini
    Kar, Jayaprakash
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6658 - 6668
  • [9] Privacy preserving integrity checking of shared dynamic cloud data with user revocation
    Thokchom, Surmila
    Saikia, Dilip Kr
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50
  • [10] PRIVACY PRESERVING FOR DATA STORAGE SECURITY IN HOSPITAL CLOUD COMPUTING
    Wang, Y. R.
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2016, 118 : 106 - 107