Privacy preserving auditing protocol for remote data storage

被引:0
|
作者
M. Suguna
S. Mercy Shalinie
机构
[1] Thiagarajar College of Engineering,Department of Computer Science and Engineering
来源
Cluster Computing | 2019年 / 22卷
关键词
Privacy preserving; Auditing; Bilinear mapping; Data intactness; Blockless verification; Remote storage;
D O I
暂无
中图分类号
学科分类号
摘要
In recent days, applications are becoming highly pervasive and enrich end user devices with various functionalities. The resource constraints at client side restrict the usage of many applications which need high storage and intensive computation. Cloud computing simplifies the deployment of large-scale distributed systems and enables advanced computational power with improved storage capabilities. Its evolution can be used for outsourcing data storage and processing. In spite of the relief, the clients no longer have control over their outsourced data which demands the purpose of ensuring the data intactness maintained by the Cloud Storage Server. For the verification of data correctness a third party trusted verifier is introduced in the proposed work which maintains dynamic metadata stored locally for the verification process. Bilinear mapping is used to ensure verification without retrieving the original data called blockless process. The verification proof generated using the proposed method is a small signature, which reduces the auditing overhead at the client side compared to existing solution. The proposed privacy preserving data auditing protocol relaxes the end users by reducing the computational overhead and achieves the verification of storage service.
引用
收藏
页码:6891 / 6898
页数:7
相关论文
共 50 条
  • [1] Privacy preserving auditing protocol for remote data storage
    Suguna, M.
    Shalinie, S. Mercy
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S6891 - S6898
  • [2] Privacy Preserving Data Auditing Protocol for Secure Storage in Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2725 - 2729
  • [3] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [4] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    [J]. Cluster Computing, 2019, 22 : 9767 - 9775
  • [5] Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013
    Bi, Jingguo
    Liu, Jiayang
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 37 - 47
  • [6] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    [J]. 2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [7] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [9] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [10] Privacy preserving auditing for shared data in cloud
    Ghutugade, Kalyani B.
    Patil, G. A.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 300 - 305