Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing

With the rapid development of cloud services, the resources-constrained enterprises and individuals can outsource the huge sensitive data into the Cloud Service Providers (CSPs) who fully control the data physically. Since CSPs are not fully trusted, it is essential to protect the integrity and confidentiality of users’ data. Plenty of researchers have devoted considerable attention to solve this issue in the last decade such as various PDP and POR schemes. In this paper, we propose an algebraic signature-based data integrity auditing scheme that ensures the cloud data integrity and confidentiality with batch auditing. Moreover, one advantage of the scheme is that it can also support data dynamics by using only one cloud server. The security analysis shows that our construction can achieve the desired security properties. We also provide the simulation results of the dynamic operations on different numbers of data blocks and sub-blocks, which show that our scheme is efficient for real-world applications.

[1]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[2]  Ilsun You,et al.  Verifiable Auditing for Outsourced Database in Cloud Computing , 2015, IEEE Transactions on Computers.

[3]  Hui Li,et al.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[4]  Witold Litwin,et al.  String-Matching and Update through Algebraic Signatures in Scalable Distributed Data Structures , 2006, 17th International Workshop on Database and Expert Systems Applications (DEXA'06).

[5]  Jian Liu,et al.  against frame and collude attacks of third party auditor , 2014 .

[6]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[7]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[8]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.

[9]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[10]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[11]  Stephen S. Yau,et al.  Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.

[12]  Özgür Ulusoy,et al.  Free Riding in Peer-to-Peer Networks , 2009, IEEE Internet Computing.

[13]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[14]  Wang Dongsheng,et al.  Enable data dynamics for algebraic signatures based remote data possession checking in the cloud storage , 2014, China Communications.

[15]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[16]  Yevgeniy Dodis,et al.  Proofs of Retrievability via Hardness Amplification , 2009, IACR Cryptol. ePrint Arch..

[17]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[18]  Xiaohua Jia,et al.  Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud , 2015 .

[19]  Jin Liu,et al.  Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.

[20]  Ali Sunyaev,et al.  Dynamic Certification of Cloud Services: Trust, but Verify! , 2016, IEEE Security & Privacy.

[21]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[22]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[23]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[24]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[25]  Jianfeng Ma,et al.  Improvement of robust smart‐card‐based password authentication scheme , 2015, Int. J. Commun. Syst..

[26]  J. Kumar SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD , 2016 .

[27]  Ali Sunyaev,et al.  Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing , 2016, IEEE Transactions on Cloud Computing.

[28]  Jianfeng Ma,et al.  New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.

[29]  Hong Jiang,et al.  Dynamic and Public Auditing with Fair Arbitration for Cloud Data , 2018, IEEE Transactions on Cloud Computing.

[30]  Jian Shen,et al.  Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.

[31]  Lanxiang Chen,et al.  Using Algebraic Signatures for Remote Data Possession Checking , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[32]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[33]  Qian Wang,et al.  Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.

[34]  Sherali Zeadally,et al.  Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.

[35]  Jian Shen,et al.  Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure , 2017, IEEE Transactions on Big Data.