Efficient Public Integrity Auditing of Collaboratively Stored Data in Cloud Storage with User Privacy Preservation

Authors

  • Maheshwari Patil  PG student, Department of Computer Science & Engineering, RV College of Engineering, Bengaluru-560059, India
  • Dr. H K Krishnappa  Associate Professor, Department of Computer Science & Engineering, RV College of Engineering, Bengaluru-560059, India

Keywords:

Provable Information Possession, Data Integrity

Abstract

People can efficiently check the accuracy of data kept in cloud storage using the Provable Information Possession (PDP) approach. This becomes more important when sensitive material is exchanged across numerous users via cloud storage, as maintaining the uploader's anonymity in the eyes of the auditor is crucial. During the auditing procedure, the auditor shouldn't be able to tell who uploaded the data. To address this challenge, numerous PDP schemes have been developed with a focus on preserving user identity privacy. Nonetheless, numerous of these suggested approaches depend on Public Key Infrastructure (PKI) methods, which bring about the substantial challenge of managing certificates. Additionally, data auditors in most of these schemes are saddled with heavy computational costs, resulting in reduced efficiency. To overcome these shortcomings, we introduce an innovative identity-based PDP protocol designed to efficiently audit the integrity of data shared within a group while preserving the uploader's privacy. Leveraging the inherent structural advantages of identity-based cryptographic mechanisms, our PDP scheme mitigates the challenges associated with certificate management. Importantly, our approach diverges from prior works by establishing the relationship between the data and the data uploader during the proof generation phase rather than the integrity auditing phase. In summary, our identity-based PDP protocol offers an elegant solution to the problem of verifying data integrity in a group-shared context while safeguarding the privacy of the data uploader. By sidestepping the complexities of certificate management and optimizing the proof generation process, our scheme enhances the efficiency and security of data auditing in cloud storage scenarios.

References

  1. M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A. V. Vasilakos, K. Li, and A. Y. Zomaya, ‘‘SeDaSC: Secure data sharing in clouds,’’ IEEE Syst. J., vol. 11, no. 2, pp. 395–404, Jun. 2017.
  2. C. Ge, W. Susilo, Z. Liu, J. Xia, P. Szalachowski, and F. Liming, ‘‘Secure keyword search and data sharing mechanism for cloud computing,’’ IEEE Trans. Dependable Secure Comput., early access, Jan. 3, 2020, doi: 10.1109/TDSC.2020.2963978.
  3. G. Chunpeng, Z. Liu, J. Xia, and F. Liming, ‘‘revocable identitybased broadcast proxy re-encryption for data sharing in clouds,’’ IEEE Trans. Dependable Secure Comput., early access, Feb. 14, 2019, doi: 10.1109/TDSC.2019.2899300.
  4. N. Santos, K. P. Gummadi, and R. Rodrigues, ‘‘towards trusted cloud computing,’’ in Proc. Conf. Hot Topics Cloud Comput., San Diego, CA, USA, 2009, pp. 14–19.
  5. M. Ali, S. U. Khan, and A. V. Vasilakos, ‘‘Security in cloud computing: Opportunities and challenges,’’ Inf. Sci., vol. 305, pp. 357–383, Jun. 2015.
  6. L. Chen, J. Li, Y. Lu, and Y. Zhang, ‘‘Adaptively secure certificate-based broadcast encryption and its application to cloud storage service,’’ Inf. Sci., vol. 538, pp. 273–289, Oct. 2020.
  7. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ‘‘Provable data possession at untrusted stores,’’ in Proc. 14th ACM Conf. Comput. Commun. Secur. (CCS), Alexandria, VA, USA, 2007, pp. 598–609.
  8. H. Shacham and B. Waters, ‘‘Compact proofs of retrievability,’’ in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secur., Melbourne, VIC, Australia, 2008, pp. 90–107.
  9. A. Juels and B. S. Kaliski, ‘‘PORs: Proofs of retrievability for large files,’’ in Proc. 14th ACM Conf. Comput. Commun. Secur. (CCS), 2007, pp. 584–597.
  10. G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, ‘‘Scalable and efficient provable data possession,’’ in Proc. 4th Int. Conf. Secur. Privacy Commun. Netowrks (SecureComm), 2008, pp. 1–10.

Downloads

Published

2023-10-30

Issue

Section

Research Articles

How to Cite

[1]
Maheshwari Patil, Dr. H K Krishnappa, " Efficient Public Integrity Auditing of Collaboratively Stored Data in Cloud Storage with User Privacy Preservation" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 5, pp.125-129, September-October-2023.