Secure Audit Service by Using TPA for Data Integrity in Cloud System

Cloud computing is the vast computing utility, where users can remotely store their data into the c loud so to have the benefit of the on-demand availability of huge a nd different applications and services from a shared pool of con figurable computing resources. Cloud-based outsourced storage space reduces the patron load of storage management. It also reduces the maintenance load of customer by providing a comparably low-cost, scalable, location-independent platform. This new model of data hosting service commence a new security challenges, which requires an independent a uditing service which audit the data integrity of cloud. The re are different existing auditing services available in cloud which audit data integrity remotely in static motion but these are n ot applicable whenever data is dynamically updated in cloud. Since it require efficient and secure dynamic auditing method for data owner. However in cloud, the clients no have direct physica l possession of data. It shows client faces different formidable ris k like missing or corruption of data. To keep away from the security a nd integrity risk of data, audit services are essential to ensur e the integrity and availability of outsourced data and to achieve digi tal forensics and credibility on cloud computing. Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data withou t retrieving it at an untrusted server, can be used to realize audit s ervices. In this paper, profiting from the interactive proof system, we address the construction of an interactive PDP protocol to prev ent the fraudulence of prove (soundness property) and the l eakage of verified data (zero-knowledge property) (1) (17) (20 ).

[1]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[2]  Roberto Tamassia,et al.  Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..

[3]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[4]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[5]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[6]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[7]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[8]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[9]  D. Pratiba,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2013 .

[10]  Xiaohua Jia,et al.  Data storage auditing service in cloud computing: challenges, methods and opportunities , 2011, World Wide Web.

[11]  P. Ramachandra Rao,et al.  Efficient Audit Service Outsourcing for Data Integrity in Clouds , 2013 .

[12]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[13]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[14]  Mary Baker,et al.  Privacy-Preserving Audit and Extraction of Digital Contents , 2008, IACR Cryptol. ePrint Arch..

[15]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.