Abstract
Cloud computing is one that provides an on-demand accessibility for computer resources, particularly data storage and computing power by the user. It is generally used to describe data hubs that remain accessible to users over the internet. The users place their data in cloud to save their local memory. The cloud service providers will control the data that is placed in the cloud. As users upload their data in cloud that is controlled by service providers, they lose control over their data. Hence, we must have few safety measures to retain the user’s data securely. Here, we described an auditing system that makes use of external auditor. We utilized Advanced Encryption Standard (AES) and Merkle Hash Tree (MHT) for ensuring integrity of cloud data. This work is accomplished in Amazon EC2 ubuntu16.04 server instance. From the results gained, we determine that our scheme is intact and considers a firm time to process files.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Qin, Z., Song, Y., Zhang, Q., Huang, J.: Cloud storage retrievability based on third party audit. In: International Workshop on Cloud Computing and Information Security (CCIS 2013), pp. 303–307, October 2013
Albeshri, A., Boyd, C., Nieto, J.: A security architecture for cloud storage combining PoR and fairness. In: CLOUD COMPUTING 2012: The Third International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 30–35 (2012). ISBN 978-1-61208-216-5
Ren, Z., Wang, L., Wang, Q., Xu, M.: Dynamic proofs of retrievability for coded cloud storage systems. IEEE Trans. Serv. Comput. PP(99) (2015)
Kumar, D.: Review on task scheduling in ubiquitous clouds. J. ISMAC 1(01), 72–80 (2019)
Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of ACM Conference on Computer and Communications Security, CCS 2007, pp. 598–609 (2007)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Secure Communication, pp. 1–10 (2011)
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 15 (2015)
Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Proceedings of 11th Workshop on Hot Topics in Operating Systems (HotOS 2007). Berkeley, CA, USA, pp. 1–6. USENIX Association (2007)
Zhu, Y., Ahn, G., Yu, M., Hu, H.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)
Juels Jr., A., Kaliski, B.S.: POR’S: proofs of retrievability for large files. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS 2007, pp. 584–597 (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. J. Adv. Cryptogr. 26(3), 442–483 (2013)
Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, 21–23 February 2011
Mo, Z., Zhou, Y., Chen, S.: A dynamic proof of retrievability (PoR) scheme with O(log n)complexity. In: ICC 2012, pp. 912–916 (2012)
Sudarsan Rao, V., Satyanarayana, N.: Experimental analysis and comparative study of secure data outsourcing schemes in cloud. Int. J. Cloud Comput. 8(1), 83–101 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Hiremath, S., Sanjeev Kunte, R. (2020). Public Auditing Scheme for Cloud Data Integrity Verification. In: Raj, J., Bashar, A., Ramson, S. (eds) Innovative Data Communication Technologies and Application. ICIDCA 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 46. Springer, Cham. https://doi.org/10.1007/978-3-030-38040-3_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-38040-3_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38039-7
Online ISBN: 978-3-030-38040-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)