A Metadata Verification Scheme for Data Auditing in Cloud Environment

Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platformservices online. The notion on verifying data for intactness is termed as data auditing and the process is carried out by the client or by a third party auditor delegated by the client. The delegation model lessen client’s overhead but may not be fully trustworthy since the third party has direct acce ss to client’s private data. The third party auditing brings in many new security challenges,and one among those is untrusted TPA. In the process of avoiding such an access this work designs a well secured, novel verification scheme that allows the vulnerable third party to perform verification aswell as ensures data privacy in cloud.

[1]  Pardeep Kumar,et al.  Effective Ways of Secure, Private and Trusted Cloud Computing , 2011, ArXiv.

[2]  Harit Shah,et al.  Security Issues on Cloud Computing , 2013, ArXiv.

[3]  Bhavesh N. Gohil,et al.  A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage , 2012, IFIPTM.

[4]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[5]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[6]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[7]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[8]  Eunmi Choi,et al.  A Taxonomy, Survey, and Issues of Cloud Computing Ecosystems , 2010, Cloud Computing.

[9]  Kevin W. Hamlen,et al.  Security Issues for Cloud Computing , 2010, Int. J. Inf. Secur. Priv..

[10]  George Hadjichristofi,et al.  Security and trust in Cloud scenarios , 2011, 2011 1st International Workshop on Securing Services on the Cloud (IWSSC).

[11]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[12]  Kevin Curran,et al.  Cloud Computing Security , 2011, Int. J. Ambient Comput. Intell..

[13]  Bu-Sung Lee,et al.  Towards Achieving Accountability, Auditability and Trust in Cloud Computing , 2011, ACC.

[14]  Gongde Guo,et al.  An Efficient Remote Data Possession Checking in Cloud Storage , 2011 .

[15]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[16]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[17]  George Pallis,et al.  Cloud Computing: The New Frontier of Internet Computing , 2010, IEEE Internet Computing.

[18]  Frank Gens,et al.  Cloud Computing Benefits, risks and recommendations for information security , 2010 .