Third Party Public Auditing scheme for Cloud Storage

被引:24
|
作者
More, Swapnali [1 ]
Chaudhari, Sangita [1 ]
机构
[1] AC Patil Coll Engn, Dept Comp Engn, Kharghar 410210, Navi Mumbai, India
关键词
Cloud Storage; TPA; Privacy Preserving; Public Auditing; Integrity;
D O I
10.1016/j.procs.2016.03.010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud storage is one of the service provided by Cloud computing in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). The user is concerned about the integrity of data stored in the cloud as the user's data can be attacked or modified by outside attacker. Therefore, a new concept called data auditing is introduced which check the integrity of data with the help of an entity called Third Party Auditor (TPA). The purpose of this work is to develop an auditing scheme which is secure, efficient to use and possess the capabilities such as privacy preserving, public auditing, maintaining the data integrity along with confidentiality. Thus the new auditing scheme has been developed by considering all these requirements. It consist of three entities: data owner, TPA and cloud server. The data owner performs various operations such as splitting the file to blocks, encrypting them, generating a hash value for each, concatenating it and generating a signature on it. The TPA performs the main role of data integrity check. It performs activities like generating hash value for encrypted blocks received from cloud server, concatenating them and generates signature on it. It later compares both the signatures to verify whether the data stored on cloud is tampered or not. It verifies the integrity of data on demand of the users. The cloud server is used only to save the encrypted blocks of data. This proposed auditing scheme make use of AES algorithm for encryption, SHA-2 for integrity check and RSA signature for digital signature calculation. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:69 / 76
页数:8
相关论文
共 50 条
  • [1] Secure and Efficient Public Auditing scheme for Cloud Storage
    More, Swapnali S.
    Chaudhari, Sangita S.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 439 - 444
  • [2] An efficient certificateless public auditing scheme in cloud storage
    Gao, Gaimei
    Fei, Hongxia
    Qin, Zefeng
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (24):
  • [3] Effective Privacy Preservation in Third-Party Cloud Storage Auditing
    Chuang, Po-Jen
    Chuang, Han-Chun
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (01) : 125 - 135
  • [4] Privacy Preserving Third Party Auditing In Multi Cloud Storage Environment
    Shashidhara, M. S.
    Jaini, C. P.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2014, : 149 - 154
  • [5] Public Auditing Scheme for Data Storage Security in Cloud Computing
    Subha, T.
    Jayashri, S.
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 773 - 787
  • [6] Division and Replication for data with public auditing scheme for cloud storage
    Salunkhe, Sujata D.
    Patil, Dhanshri
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,
  • [7] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [8] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700
  • [9] An Efficient Public Auditing Scheme for Multi-Cloud Storage
    Yu, Haiyang
    Cai, Yongquan
    Kong, Shanshan
    Xue, Fei
    Allah, Ditta
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 81 - 96
  • [10] A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation
    Shen, Wenting
    Yu, Jia
    Hao, Rong
    Wang, Xu An
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 36 - 39