Efficient and secure auditing scheme for outsourced big data with dynamicity in cloud

Big data offers significant benefits; however, security and privacy problems must be considered, especially with regard to outsourced big data. Auditing outsourced big data is an important factor in security and privacy. However, most of the existing auditing techniques are not suitable for outsourced big data due to their high computational and communication costs at the auditor and the data owner (DO) side. In this paper, we propose an efficient auditing scheme for outsourced big data based on algebraic signatures and an XOR-homomorphic function, that can achieve numerous advantages, such as fewer challenges and proofs, non-block verification, data privacy preservation, and lower computational and communication costs. The proposed scheme enables a trusted third-party auditor, on behalf of DOs, to audit the outsourced data in a cloud. Thus, reducing the computational burden on the DOs. Subsequently, we construct a new data structure called a Record Table (RTable) and extend the basic auditing scheme to support the data dynamic operations. As our extended scheme does not use public key encryption, the entire process of updating the data incurs only a small computational and communication overhead with regard to the auditor, the DOs, and the cloud server. Finally, the proposed basic scheme is proved secure under the security model against various attacks. Analysis of the performance shows that both our basic scheme and extended scheme are highly efficient.

[1]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[2]  Abejide OluAde-Ibijola A Simulated Enhancement of Fisher-Yates Algorithm for Shuffling in Virtual Card Games using Domain-specific Data Structures , 2012 .

[3]  Lin Guoyuan,et al.  A hybrid approach for selection in service community , 2014, China Communications.

[4]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[5]  Jiqiang Liu,et al.  Public verifiability for shared data in cloud storage with a defense against collusion attacks , 2016, Science China Information Sciences.

[6]  Baochun Li,et al.  Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud , 2014, IEEE Trans. Cloud Comput..

[7]  P. Varalakshmi,et al.  A review on public auditing in cloud environment , 2016, 2016 International Conference on Information Communication and Embedded Systems (ICICES).

[8]  Reza Curtmola,et al.  Remote data checking using provable data possession , 2011, TSEC.

[9]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[10]  Hui Li,et al.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[11]  M. Anwar Hasan,et al.  Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[12]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[13]  Lei Zhang,et al.  Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.

[14]  Wang Dongsheng,et al.  Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage , 2014, China Communications.

[15]  Rajkumar Buyya,et al.  Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..

[16]  M. Anwar Hasan,et al.  On Verifying Dynamic Multiple Data Copies over Cloud Servers , 2011, IACR Cryptol. ePrint Arch..

[17]  David Cash,et al.  Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.

[18]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[19]  Abejide Ade-Ibijola A Simulated Enhancement of Fisher-Yates Algorithm for Shuffling in Virtual Card Games using Domain-Specific Data Structures , 2012 .

[20]  Lanxiang Chen,et al.  Using algebraic signatures to check data possession in cloud storage , 2013, Future Gener. Comput. Syst..

[21]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[22]  Yong Yu,et al.  Remote data possession checking with enhanced security for cloud storage , 2015, Future Gener. Comput. Syst..

[23]  Jianhong Zhang,et al.  Efficient ID-based public auditing for the outsourced data in cloud storage , 2016, Inf. Sci..

[24]  Cees T. A. M. de Laat,et al.  Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure , 2013, Secure Data Management.

[25]  Witold Litwin,et al.  Algebraic signatures for scalable distributed data structures , 2004, Proceedings. 20th International Conference on Data Engineering.

[26]  Nor Badrul Anuar,et al.  Towards Dynamic Remote Data Auditing in Computational Clouds , 2014, TheScientificWorldJournal.

[27]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[28]  Li Xu,et al.  Data dynamics for remote data possession checking in cloud storage , 2013, Comput. Electr. Eng..

[29]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[30]  Huaqun Wang,et al.  Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud , 2016, IEEE Transactions on Information Forensics and Security.

[31]  Roberto Tamassia,et al.  Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..

[32]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[33]  Victor I. Chang,et al.  Secure searching on cloud storage enhanced by homomorphic indexing , 2016, Future Gener. Comput. Syst..

[34]  Yang Li,et al.  Provably secure cloud storage for mobile networks with less computation and smaller overhead , 2017, Science China Information Sciences.

[35]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.