Public Auditing Scheme for Data Storage Security in Cloud Computing

被引:4
|
作者
Subha, T. [1 ]
Jayashri, S. [2 ]
机构
[1] Anna Univ, Sri Sai Ram Engn Coll, Dept Informat Technol, Madras 600044, Tamil Nadu, India
[2] Adhiparasakthi Engn Coll, Dept Elect & Commun, Melmaruvathur 603319, Tamil Nadu, India
关键词
queuing model; scheduling; prioritization; fuzzy decision tree; performance;
D O I
10.6688/JISE.2017.33.3.11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become popular and adopted by large number of industries (or) enterprises who outsource their IT services to cloud service provider (CSP). The maintenance and operations of their services have become easier and cost effective. Data processing services are one among the major and important component in IT services, since IT functions progress around data processing. In particular privacy and security of user's data brings many challenges that have not been effectively addressed. A specific problem occurs when clients outsource their files (contains data) to the cloud storage server and the services are offered by cloud service provider (CSP), which is an untrusted entity. In this paper we introduce an Index Table Structure (ITS) based public auditing scheme to verify the integrity of the data stored in a cloud. Previous work requires CSP to store and maintain the data property information needed for auditing. In our approach we keep the data auditing information in trusted third party auditor (TTPA), results in reducing communication overhead and computational cost. Our method is a public auditing scheme based on ITS with TTPA, who performs auditing on behalf of the user. We extend our work to support privacy preserving property by signing the proof generated by cloud server during verification process. Thus, the result shows our proposed scheme is secure and provide with better efficiency.
引用
收藏
页码:773 / 787
页数:15
相关论文
共 50 条
  • [41] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [42] An Effective Auditing Scheme for Cloud Computing
    Houlihan, Ryan
    Du, Xiaojiang
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 1599 - 1604
  • [43] A framework for Data Security and Storage in Cloud Computing
    Bhandari, Akshita
    Gupta, Ashutosh
    Das, Debasis
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [44] Ensuring Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 37 - +
  • [45] Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems
    Zhang, Xiaojun
    Wang, Xin
    Gu, Dawu
    Xue, Jingting
    Tang, Wei
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 5333 - 5347
  • [46] Redactable Signature-Based Public Auditing Scheme With Sensitive Data Sharing for Cloud Storage
    Li, Song
    Han, Jinguang
    Tong, Deyu
    Cui, Jie
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 3613 - 3624
  • [47] A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage
    Tian, Junfeng
    Jing, Xuan
    [J]. IEEE ACCESS, 2019, 7 : 68071 - 68082
  • [48] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599
  • [49] Public Auditing Scheme for Cloud Data with User Revocation and Data Dynamics
    Yang Xiaodong
    Liu Tingting
    Yang Ping
    An Faying
    Yang Miaomiao
    Xiao Likun
    [J]. PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 813 - 817
  • [50] A data encryption scheme for cloud storage security
    Wu, Wei-nong
    Zheng, Yuan-bing
    Wu, Bin
    Wu, Lie
    [J]. WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 666 - 674