Enabling public auditability for operation behaviors in cloud storage

被引:15
|
作者
Tian, Hui [1 ]
Chen, Zhaoyi [1 ]
Chang, Chin-Chen [2 ]
Kuribayashi, Minoru [3 ]
Huang, Yongfeng [4 ]
Cai, Yiqiao [1 ]
Chen, Yonghong [1 ]
Wang, Tian [1 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Okayama Univ, Grad Sch Nat Sci & Technol, Okayama 7008530, Japan
[4] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
关键词
Cloud storage; Public auditing; Operation behaviors; Merkle hash tree; Secure logging; SECURITY; CHALLENGES;
D O I
10.1007/s00500-016-2311-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we focus on auditing for users' operation behaviors, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination in the forensic. We first present a public model for operation behaviors in cloud storage, in which a trusted third party is introduced to verify the integrity of operation behavior logs to enhance the credibility of forensic results as well as alleviate the burden of the forensic investigator. Further, we design a block-based logging approach to support selective verification and a hash-chain-based structure for each log block to ensure the forward security and append-only properties for log entries. Moreover, to achieve the tamper resistance of log blocks and non-repudiation of auditing proofs, we employ Merkle hash tree (MHT) to record the hash values of the aggregation authentication block tags sequentially and publish the root of MHT to the public once a block has been appended. Meanwhile, using the authentication property of MHT, our scheme can provide log-less verification with privacy preservation. We formally prove the security of the proposed scheme and evaluate its performance on entry appending and verification by concrete experiments and comparisons with the state-of-the-art schemes. The results demonstrate that the proposed scheme can effectively achieve secure auditing for log files of operation behaviors in cloud storage and outperforms the previous ones in computation complexity and communication overhead.
引用
收藏
页码:2175 / 2187
页数:13
相关论文
共 50 条
  • [1] Enabling public auditability for operation behaviors in cloud storage
    Hui Tian
    Zhaoyi Chen
    Chin-Chen Chang
    Minoru Kuribayashi
    Yongfeng Huang
    Yiqiao Cai
    Yonghong Chen
    Tian Wang
    [J]. Soft Computing, 2017, 21 : 2175 - 2187
  • [2] Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    Li, Jin
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (05) : 847 - 859
  • [3] Enhanced Public Auditability & Secure Data Storage in Cloud Computing
    Chakraborty, Tamal Kanti
    Dhami, Anil
    Bansal, Prakhar
    Singh, Tripti
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 101 - 105
  • [4] A framework with data-centric accountability and auditability for cloud storage
    Hao Jin
    Ke Zhou
    Yan Luo
    [J]. The Journal of Supercomputing, 2018, 74 : 5903 - 5926
  • [5] A New Fog-Cloud Storage Framework with Transparency and Auditability
    Kim, Yeojin
    Kim, Donghyun
    Son, Junggab
    Wang, Wei
    Noh, YoungTae
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] A framework with data-centric accountability and auditability for cloud storage
    Jin, Hao
    Zhou, Ke
    Luo, Yan
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (11): : 5903 - 5926
  • [7] Enabling public verifiability and availability for secure data storage in cloud computing
    Jogdand, Rashmi M.
    Goudar, R. H.
    Sayed, Gazal Begum
    Dhamanekar, Pratik B.
    [J]. EVOLVING SYSTEMS, 2015, 6 (01) : 55 - 65
  • [8] Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
    Wang, Qian
    Wang, Cong
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    [J]. COMPUTER SECURITY - ESORICS 2009, PROCEEDINGS, 2009, 5789 : 355 - +
  • [9] Secure Logging and Public Audit for Operation Behavior in Cloud Storage
    Chen, Zhaoyi
    Tian, Hui
    Lug, Jing
    Nan, Fulin
    Cai, Yiqiao
    Wang, Tian
    Chen, Yonghong
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 444 - 450
  • [10] Public audit for operation behavior logs with error locating in cloud storage
    Tian, Hui
    Chen, Zhaoyi
    Chang, Chin-Chen
    Huang, Yongfeng
    Wang, Tian
    Huang, Zheng-an
    Cai, Yiqiao
    Chen, Yonghong
    [J]. SOFT COMPUTING, 2019, 23 (11) : 3779 - 3792