Privacy-Preserving Public Auditing for Secure Cloud Storage

Authors

  • Maragoni Mahendar  Assistanr Professor, Department of CSE, AVANTHI'S scientific of technological & research academy, Hyderabad, Telangana, India
  • Malipatel Anusha  M.Tech Student, Department of CSE, AVANTHI'S scientific of technological & research academy, Hyderabad, Telangana, India

Keywords:

Cloud Computing, TPA, Cloud Storage, NIST, PoR scheme, RAM technique, HARS, CSS, Cloud Service Provider

Abstract

Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. So correctness of data and security is a prime concern. This article studies the problem of ensuring the integrity and security of data storage in Cloud Computing. Security in cloud is achieved by signing the data block before sending to the cloud. Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Thus, enabling public audit ability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

References

  1. C. Wang, Q. Wang, K. Ren, a n d W. Lou, "Privacy- Preserving Public Auditing for Storage Security in Cloud Computing," Proc. IEEE INFOCOM ‟10, Mar. 2010.
  2. P. Mell and T. Grance, "Draft NIST Working Definition of Cloud Computing," http://csrc.nist.gov/groups/SNS/cloud- computing/index.html, June 2009.
  3. Pearson, S. 2012. Privacy, Security and Trust in Cloud Computing. Privacy and Security for Cloud Computing,3-42.
  4. Cloud Security Alliance, "Top Threats to Cloud Computing," http://www.cloudsecurityalliance.org, 2010
  5. M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions," http://www.techcrunch.com/2006/12/28/gmail disasterreports- of-mass-email-deletions/, 2006. [6]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security (CCS ‟07), pp. 598-609, 2007.
  6. G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Int‟l Conf. Security and Privacy in Comm. Networks (SecureComm ‟08), pp. 1-10, 2008.
  7. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-based Distributed Stroage Systems," in Proc. ACM Cloud Computing Security Workshop (CCSW), 2010, pp.31– 42.
  8. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,"Dynamic Provable Data Possession," Proc. 16th ACM Conf.Computer and Comm. Security (CCS ‟09), 2009.
  9. A. Juels and J. Burton, S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. ACM Conf. Computer and Comm. Security (CCS ‟07), pp. 584-597, Oct. 2007

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Maragoni Mahendar, Malipatel Anusha, " Privacy-Preserving Public Auditing for Secure Cloud Storage , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.242-246, January-February-2018.