Data integrity auditing for secure cloud storage using user behavior prediction

被引:10
|
作者
Tian, Junfeng [1 ,2 ,3 ]
Wang, Haoning [1 ,2 ,3 ]
Wang, Meng [1 ,2 ,3 ]
机构
[1] Hebei Univ, Sch Cyberspace Secur, Baoding 071000, Peoples R China
[2] Hebei Univ, Comp Inst, Baoding 071000, Peoples R China
[3] Hebei Univ, Hebei Key Lab High Confidence Informat Syst, Baoding 071000, Peoples R China
关键词
Data integrity; Cloud storage; User behavior prediction; Valid auditing; Data sharing;
D O I
10.1016/j.cose.2021.102245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data integrity is a core security issue in reliable cloud storage that has received widespread attention. Data auditing protocols enable verifiers to efficiently check the integrity of out sourced data without downloading the data. A key research challenge associated with the design of existing data auditing protocols is the efficiency of the auditing process. Since existing protocols tend to auditing all cloud data, in fact, some data may have just been used or will be used soon, then auditing all these data is invalid, which is a waste of resources. In this paper, we attempt to address the waste of resources due to invalid auditing in cloud data integrity checking by introducing user behavior prediction algorithms,the first in such an approach, to the best of our knowledge. More specifically, we introduce the concept of valid auditing in data integrity verification based on the concept of valid auditing. We formalize a system model and a security model for this new concept. Then, using user behavior prediction algorithms, we give methods to improve auditing efficiency and reduce invalid auditing. Finally, we develop a prototype implementation of the protocol to validate the practicality of the scheme. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation
    Luo, Yuchuan
    Xu, Ming
    Fu, Shaojing
    Wang, Dongsheng
    Deng, Junquan
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 434 - 442
  • [2] Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
    Shen, Wenting
    Qin, Jing
    Yu, Jia
    Hao, Rong
    Hu, Jiankun
    Ma, Jixin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1408 - 1421
  • [3] A Compressive Integrity Auditing Protocol for Secure Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (03) : 1197 - 1209
  • [4] Efficient Data Integrity Auditing Supporting Provable Data Update for Secure Cloud Storage
    Yang, Changsong
    Song, Bowen
    Ding, Yong
    Ou, Jiangtao
    Fan, Chengyuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [5] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [6] A Lightweight Auditing Service for Shared Data with Secure User Revocation in Cloud Storage
    Rabaninejad, Reyhaneh
    Attari, Mahmoud Ahmadian
    Asaar, Maryam Rajabzadeh
    Aref, Mohammad Reza
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 1 - 15
  • [7] Public Integrity Auditing for Shared Data with Efficient and Secure User Revocation in Cloud Computing
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 588 - 593
  • [8] Secure Storage of Electronic Health Records on Cloud Using Integrity Verification Auditing
    Srinivasan, S.
    Keerthi, Kethineni
    Tejaswi, Gummadi
    Shobana, Kodali Divya
    [J]. REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2021, 11 (02): : 2132 - 2141
  • [9] Secure Data Deduplication and Efficient Storage Utilization in Cloud Servers Using Encryption, Compression and Integrity Auditing
    Nair, Arya S.
    Radhakrishnan, B.
    Jayakrishnan, R. P.
    Kanthan, Padma Suresh Lekshmi
    [J]. SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 326 - 334
  • [10] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):