Skip to main content

Public Auditing Scheme for Cloud Data Integrity Verification

  • Conference paper
  • First Online:
Innovative Data Communication Technologies and Application (ICIDCA 2019)

Abstract

Cloud computing is one that provides an on-demand accessibility for computer resources, particularly data storage and computing power by the user. It is generally used to describe data hubs that remain accessible to users over the internet. The users place their data in cloud to save their local memory. The cloud service providers will control the data that is placed in the cloud. As users upload their data in cloud that is controlled by service providers, they lose control over their data. Hence, we must have few safety measures to retain the user’s data securely. Here, we described an auditing system that makes use of external auditor. We utilized Advanced Encryption Standard (AES) and Merkle Hash Tree (MHT) for ensuring integrity of cloud data. This work is accomplished in Amazon EC2 ubuntu16.04 server instance. From the results gained, we determine that our scheme is intact and considers a firm time to process files.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qin, Z., Song, Y., Zhang, Q., Huang, J.: Cloud storage retrievability based on third party audit. In: International Workshop on Cloud Computing and Information Security (CCIS 2013), pp. 303–307, October 2013

    Google Scholar 

  2. Albeshri, A., Boyd, C., Nieto, J.: A security architecture for cloud storage combining PoR and fairness. In: CLOUD COMPUTING 2012: The Third International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 30–35 (2012). ISBN 978-1-61208-216-5

    Google Scholar 

  3. Ren, Z., Wang, L., Wang, Q., Xu, M.: Dynamic proofs of retrievability for coded cloud storage systems. IEEE Trans. Serv. Comput. PP(99) (2015)

    Google Scholar 

  4. Kumar, D.: Review on task scheduling in ubiquitous clouds. J. ISMAC 1(01), 72–80 (2019)

    Google Scholar 

  5. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of ACM Conference on Computer and Communications Security, CCS 2007, pp. 598–609 (2007)

    Google Scholar 

  6. Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Secure Communication, pp. 1–10 (2011)

    Google Scholar 

  7. Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 15 (2015)

    Article  Google Scholar 

  8. Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Proceedings of 11th Workshop on Hot Topics in Operating Systems (HotOS 2007). Berkeley, CA, USA, pp. 1–6. USENIX Association (2007)

    Google Scholar 

  9. Zhu, Y., Ahn, G., Yu, M., Hu, H.: Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12), 2231–2244 (2012)

    Article  Google Scholar 

  10. Juels Jr., A., Kaliski, B.S.: POR’S: proofs of retrievability for large files. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS 2007, pp. 584–597 (2007)

    Google Scholar 

  11. Shacham, H., Waters, B.: Compact proofs of retrievability. J. Adv. Cryptogr. 26(3), 442–483 (2013)

    Article  MathSciNet  Google Scholar 

  12. Zheng, Q., Xu, S.: Fair and dynamic proofs of retrievability. In: First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, 21–23 February 2011

    Google Scholar 

  13. Mo, Z., Zhou, Y., Chen, S.: A dynamic proof of retrievability (PoR) scheme with O(log n)complexity. In: ICC 2012, pp. 912–916 (2012)

    Google Scholar 

  14. Sudarsan Rao, V., Satyanarayana, N.: Experimental analysis and comparative study of secure data outsourcing schemes in cloud. Int. J. Cloud Comput. 8(1), 83–101 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shivarajkumar Hiremath .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hiremath, S., Sanjeev Kunte, R. (2020). Public Auditing Scheme for Cloud Data Integrity Verification. In: Raj, J., Bashar, A., Ramson, S. (eds) Innovative Data Communication Technologies and Application. ICIDCA 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 46. Springer, Cham. https://doi.org/10.1007/978-3-030-38040-3_28

Download citation

Publish with us

Policies and ethics