Enabling public auditability for operation behaviors in cloud storage

被引:15
|
作者
Tian, Hui [1 ]
Chen, Zhaoyi [1 ]
Chang, Chin-Chen [2 ]
Kuribayashi, Minoru [3 ]
Huang, Yongfeng [4 ]
Cai, Yiqiao [1 ]
Chen, Yonghong [1 ]
Wang, Tian [1 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[3] Okayama Univ, Grad Sch Nat Sci & Technol, Okayama 7008530, Japan
[4] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
关键词
Cloud storage; Public auditing; Operation behaviors; Merkle hash tree; Secure logging; SECURITY; CHALLENGES;
D O I
10.1007/s00500-016-2311-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we focus on auditing for users' operation behaviors, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination in the forensic. We first present a public model for operation behaviors in cloud storage, in which a trusted third party is introduced to verify the integrity of operation behavior logs to enhance the credibility of forensic results as well as alleviate the burden of the forensic investigator. Further, we design a block-based logging approach to support selective verification and a hash-chain-based structure for each log block to ensure the forward security and append-only properties for log entries. Moreover, to achieve the tamper resistance of log blocks and non-repudiation of auditing proofs, we employ Merkle hash tree (MHT) to record the hash values of the aggregation authentication block tags sequentially and publish the root of MHT to the public once a block has been appended. Meanwhile, using the authentication property of MHT, our scheme can provide log-less verification with privacy preservation. We formally prove the security of the proposed scheme and evaluate its performance on entry appending and verification by concrete experiments and comparisons with the state-of-the-art schemes. The results demonstrate that the proposed scheme can effectively achieve secure auditing for log files of operation behaviors in cloud storage and outperforms the previous ones in computation complexity and communication overhead.
引用
收藏
页码:2175 / 2187
页数:13
相关论文
共 50 条
  • [21] Towards Achieving Accountability, Auditability and Trust in Cloud Computing
    Ko, Ryan K. L.
    Lee, Bu Sung
    Pearson, Siani
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 432 - +
  • [22] Secure Deduplication on Public Cloud Storage
    Graupner, Hendrik
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Meinel, Christoph
    [J]. ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 34 - 41
  • [23] Public Auditing: Cloud Data Storage
    Parwekar, Pritee
    Saxena, Mayuri
    Kumar, Prakash
    Saxena, Sakshi
    [J]. 2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 169 - 173
  • [24] Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control
    Tang, Heyi
    Cui, Yong
    Guan, Chaowen
    Wu, Jianping
    Weng, Jian
    Ren, Kui
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 59 - 70
  • [25] Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
    Yu, Jia
    Ren, Kui
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1362 - 1375
  • [26] Enabling Data Storage Security in Cloud Computing for Banking Enterprise
    Biruntha, S.
    Kumar, V. Venkatesa
    Palaniswami, S.
    [J]. RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 217 - +
  • [27] SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage
    Shin, Youngjoo
    Koo, Dongyoung
    Yun, Joobeom
    Hur, Junbeom
    [J]. 2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 482 - 487
  • [28] Enabling Cloud Storage Security based on Rate less Codes
    Pahariya, Parth
    Pasupuleti, Syam Kumar
    [J]. 2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [29] Operation and Maintenance System of Public Cloud Service
    Yi, Huang
    Liang Xiongjian
    Zhang Wenjian
    Lei, Fang
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 84 - 91
  • [30] Enabling Cloud Storage Auditing With Key-Exposure Resistance
    Yu, Jia
    Ren, Kui
    Wang, Cong
    Varadharajan, Vijay
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1167 - 1179