Secure and Efficient Dynamic Data Operations in Cloud Computing

High quality of remote storage for on demand data without worrying about hardware and software running is provided by cloud computing. The user need not to physically posses their outsourced data since it creates new threats towards the stored data on cloud. A solution to address the new problem for achieving secure and reliable cloud services the paper proposes a trusted third party auditing, token pre-computation and erasure rule data are deployed. The scheme allows users to audit cloud storage with minimum computing and communication costs. The results guarantee storage correctness and fast access to misbehaving servers. The cloud data are considered to be dynamic, the proposed system supports for secure and efficient dynamic operations onto outsourced data including chunk alteration, erasure, add.

[1]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[2]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[3]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[4]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[5]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[6]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[7]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[8]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[9]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[10]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[11]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[12]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..

[13]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[14]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[15]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.

[16]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[17]  D. B. Davis,et al.  Sun Microsystems Inc. , 1993 .