RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing

被引:29
|
作者
Garg, Neenu [1 ]
Bawa, Seema [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Proof of possession; Data integrity audit; Third party audit; Cloud computing;
D O I
10.1016/j.jnca.2017.02.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a recent phrase in marketing for a concept which has been known for years: Outsourcing. Cloud computing provides cornucopian of gratuities for both individual users and business organizations. 'Cloud' is more of a notion where files and data are hosted online and can be accessed when required via a number of methods, anywhere, and at any time. That is the gist of it. Providing storage space to cloud users is an appealing service of cloud computing. Although cloud storage provides benefits of location independence access to data, reduced burden for hardware and software maintenance and many more, yet this service has several challenges in the range of security and preserving data. Cloud servers may exist in white puffy shapes in the azure, but these are not immune to temporal errors. To ensure that outsourced data is secure and is not tampered, cloud provider must allow data proprietor to periodically audit data integrity. Numerous Remote Data Auditing (RDA) protocols have been proposed by researchers so far. In presented work, to cope with this problem we analyze the efficiency issues of a current protocol for data integrity auditing in cloud storage and propose an approach based on Relative Index and Time Stamped Merkle Hash Tree (RITS - - MHT) which integrates MHT with relative index of a node resulting in reduction of computation cost of searching a data block from O(n) in Wang's protocol to O(log n) and time of last modification to data, thereby guarantying freshness of data respectively. RITS - - MHT ensures that the outsourced data has not been polluted as well as it assures that the recent copy of data is reclaimed. This protocol supports public auditing of data, and efficiently supports data dynamic operations like insertion, modification, deletion of outsourced data at minimal computational cost. The security of proposed protocol has been proved in Random Oracle Model (ROM). As compared to Wang's protocol, RITS - - NWT is more efficient in terms of computation cost.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 17 条
  • [1] Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
    Liu, Zhenpeng
    Wang, Shuo
    Duan, Sichen
    Ren, Lele
    Wei, Jianhang
    [J]. ELECTRONICS, 2023, 12 (03)
  • [2] Merkle Tree and Blockchain-Based Cloud Data Auditing
    Mohan, Arun Prasad
    Asfak, Mohamed R.
    Gladston, Angelin
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (03) : 54 - 66
  • [3] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [4] Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree
    Rao, Lu
    Zhang, Hua
    Tu, Tengfei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) : 451 - 463
  • [5] DLSBD-MHT: Dual-Level Source-Based Deduplication with Merkle-Hash-Tree for Big Data
    Huang, Ke
    Zhang, Xiaosong
    Sun, Lin
    Wang, Xiaofen
    [J]. 2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 363 - 367
  • [6] An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
    R. Ramya
    T. Sasikala
    [J]. Soft Computing, 2019, 23 : 13423 - 13431
  • [7] An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing
    Ramya, R.
    Sasikala, T.
    [J]. SOFT COMPUTING, 2019, 23 (24) : 13423 - 13431
  • [8] Blockchain-Based Dynamic Cloud Data Integrity Auditing via Non-Leaf Node Sampling of Rank-Based Merkle Hash Tree
    Wang, Chenxu
    Sun, Yifan
    Liu, Boyang
    Xue, Lei
    Guan, Xiaohong
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (05): : 3931 - 3942
  • [9] A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud
    Chen, Fei
    Xiang, Tao
    Chen, Jianyong
    Yu, Wei
    Fu, Xinwen
    Zhang, Shengyu
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, 2015, : 219 - 226
  • [10] Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment
    Rahul Mishra
    Dharavath Ramesh
    Damodar Reddy Edla
    [J]. Cluster Computing, 2021, 24 : 1361 - 1379