Enhanced public auditability & secure data storage in cloud computing

Cloud computing is the most envisioned paradigm shift in the computing world. Its services are being applied in several IT scenarios. This unique platform has brought new security issues to contemplate. This paper proposes a homomorphic encryption scheme based on the Elliptic curve cryptography. It implements a provable data possession scheme to support dynamic operation on data. The application of proof of retrievability scheme provisioned the client to challenge integrity of the data stored. The notion of a third party auditor (TPA) is considered, who verifies and modifies the data on behalf of the client. Data storage at the server is done using a Merkle hash tree (MHT) accomplishing faster data access. This proffered scheme not only checks the data storage correctness but also identifies misbehaving servers. The initial results demonstrate its effectiveness as an improved security system for data storage compared to the existing ones in most prospects.

[1]  Shobana,et al.  Introducing Effective Third Party Auditing ( TPA ) for Data Storage Security in Cloud , .

[2]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[3]  Cong Wang,et al.  Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.

[4]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[5]  Abdulhadi Shoufan,et al.  A fast hash tree generator for Merkle signature scheme , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.

[6]  William R. Claycomb,et al.  Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[7]  Jin H. Im,et al.  Privacy , 2002, Encyclopedia of Information Systems.

[8]  Willi Meier,et al.  An attack on the isomorphisms of polynomials problem with one secret , 2003, International Journal of Information Security.

[9]  Tsuyoshi Takagi,et al.  Exceptional Procedure Attack on Elliptic Curve Cryptosystems , 2003, Public Key Cryptography.

[10]  Xinlei Wang,et al.  Research of cloud computing data security technology , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[11]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[12]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[13]  Wei-Kuan Shih,et al.  An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.

[14]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[15]  Anja Becker,et al.  Methods of Fault Analysis Attacks on Elliptic Curve Cryptosystems , 2006 .

[16]  Satish Muppidi,et al.  Data Security in Cloud Computing with Elliptic Curve Cryptography , 2012 .

[17]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[18]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.