Data integrity auditing for secure cloud storage using user behavior prediction

被引:10
|
作者
Tian, Junfeng [1 ,2 ,3 ]
Wang, Haoning [1 ,2 ,3 ]
Wang, Meng [1 ,2 ,3 ]
机构
[1] Hebei Univ, Sch Cyberspace Secur, Baoding 071000, Peoples R China
[2] Hebei Univ, Comp Inst, Baoding 071000, Peoples R China
[3] Hebei Univ, Hebei Key Lab High Confidence Informat Syst, Baoding 071000, Peoples R China
关键词
Data integrity; Cloud storage; User behavior prediction; Valid auditing; Data sharing;
D O I
10.1016/j.cose.2021.102245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data integrity is a core security issue in reliable cloud storage that has received widespread attention. Data auditing protocols enable verifiers to efficiently check the integrity of out sourced data without downloading the data. A key research challenge associated with the design of existing data auditing protocols is the efficiency of the auditing process. Since existing protocols tend to auditing all cloud data, in fact, some data may have just been used or will be used soon, then auditing all these data is invalid, which is a waste of resources. In this paper, we attempt to address the waste of resources due to invalid auditing in cloud data integrity checking by introducing user behavior prediction algorithms,the first in such an approach, to the best of our knowledge. More specifically, we introduce the concept of valid auditing in data integrity verification based on the concept of valid auditing. We formalize a system model and a security model for this new concept. Then, using user behavior prediction algorithms, we give methods to improve auditing efficiency and reduce invalid auditing. Finally, we develop a prototype implementation of the protocol to validate the practicality of the scheme. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
    Singh, Premlata
    Saroj, Sushil Kr
    [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 695 - 700
  • [22] Improved secure fuzzy auditing protocol for cloud data storage
    Zhang, Jindan
    Wang, Baocang
    He, Debiao
    Wang, Xu An
    [J]. SOFT COMPUTING, 2019, 23 (10) : 3411 - 3422
  • [23] A survey of public auditing for secure data storage in cloud computing
    [J]. Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [24] Improved secure fuzzy auditing protocol for cloud data storage
    Jindan Zhang
    Baocang Wang
    Debiao He
    Xu An Wang
    [J]. Soft Computing, 2019, 23 : 3411 - 3422
  • [25] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599
  • [26] Secure cloud storage auditing with deduplication and efficient data transfer
    Jingze Yu
    Wenting Shen
    [J]. Cluster Computing, 2024, 27 : 2203 - 2215
  • [27] Secure cloud storage auditing with deduplication and efficient data transfer
    Yu, Jingze
    Shen, Wenting
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2203 - 2215
  • [28] Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage
    Jaya Rao Gudeme
    Syam Kumar Pasupuleti
    Ramesh Kandukuri
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 2019 - 2032
  • [29] Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage
    Gudeme, Jaya Rao
    Pasupuleti, Syam Kumar
    Kandukuri, Ramesh
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (02) : 2019 - 2032
  • [30] Data Integrity and Data Dynamics with Secure Storage Service in Cloud
    Nithiavathy, R.
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,