Data verification using block level batch auditing on multi-cloud server

In cloud computing, storage as a service provides an on-demand, flexible data sharing across the networks. This reduces the burden of local data storage management and avoidance of resource maintenance (Hardware or software). In this paradigm, data owner loses the control of the outsourced data, once the data leaves the data owner premises. Due to this, the data on an untrusted cloud server is at risk in terms of integrity, confidentiality and availability of the outsourced data. In order to maintain the outsourced data without corruption from the internal or external adversary, an efficient data auditing verification method is required for data verification. In this paper, we propose a flexible data auditing method using block level auditing of data distributed on multiple cloud servers. This method utilizes the Computational Diffie-Hellman (CDH) and Decisional Diffie-Hellman (DDH) problem solving techniques. The performance of data verification with different sizes of data blocks on multiple servers. Compared to the existing methods of data auditing the proposed method minimizes the computation, communication and storage overheads.

[1]  Tan Shuang,et al.  An efficient method for checking the integrity of data in the Cloud , 2014, China Communications.

[2]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[3]  R Raghavendran,et al.  Security Challenges for Public Cloud , 2015 .

[4]  Sanjay Kumar Madria Security and Risk Assessment in the Cloud , 2016, Computer.

[5]  Hui Li,et al.  Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.

[6]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[7]  Elaine Shi,et al.  Cloud Data Protection for the Masses , 2012, Computer.

[8]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[9]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[10]  Liu Yang,et al.  An Efficient and Secure Public Batch Auditing Protocol for Dynamic Cloud Storage Data , 2016, 2016 International Computer Symposium (ICS).

[11]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[12]  Priyanka,et al.  Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage , 2014 .

[13]  Qian Wang,et al.  Dynamic Proofs of Retrievability for Coded Cloud Storage Systems , 2018, IEEE Transactions on Services Computing.

[14]  Min-Shiang Hwang,et al.  A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage , 2016, Int. J. Netw. Secur..

[15]  Hao Yan,et al.  A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Ye Tian,et al.  Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage , 2017, Int. J. Netw. Secur..

[17]  Huaqun Wang,et al.  Identity-Based Distributed Provable Data Possession in Multicloud Storage , 2015, IEEE Transactions on Services Computing.

[18]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[19]  Fenghua Li,et al.  Efficient public verification on the integrity of multi-owner data in the cloud , 2014, Journal of Communications and Networks.

[20]  Victor I. Chang,et al.  A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System , 2017, Int. J. Netw. Secur..

[21]  Ch.V.V. Narasimha Raju,et al.  Cloud Data Protection for Masses , 2015 .

[22]  Jiankun Hu,et al.  Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds , 2017, IEEE Transactions on Information Forensics and Security.

[23]  Lin Tan,et al.  An efficient method for checking the integrity of data in the Cloud , 2014 .

[24]  Jianhong Zhang,et al.  An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).