Call for Paper - December 2019 Edition
IJCA solicits original research papers for the December 2019 Edition. Last date of manuscript submission is November 20, 2019. Read More

Secure Audit Service by using TPA

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Pradnya P. Kulkarni
10.5120/ijca2016909136

Pradnya P Kulkarni. Article: Secure Audit Service by using TPA. International Journal of Computer Applications 139(4):7-10, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Pradnya P. Kulkarni},
	title = {Article: Secure Audit Service by using TPA},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {4},
	pages = {7-10},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Using Cloud Storage, users can remotely store their data and enjoy high quality applications and services from a shared pool of resources. However, users, when they don’t have the physical possession of the data, chances of raising data integrity issue are possible. Thus, verification of data integrity is the at most important for a user, who has outsourced data to the cloud. To make the integrity check, a public auditing must be made possible. For it, resort to a Third Party Auditor (TPA). Also, the auditing process should not bring in further more burdens to the user, a secure cloud storage for which integrate the technique of Homomorphic linear authenticator with random masking. Thereby, assure integrity of the user’s outsourced data in the cloud.

References

  1. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,” Proc. IEEE INFOCOM ’10, Mar. 2010.
  2. P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, June 2009.
  3. M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.
  4. Cloud Security Alliance, “Top threats to Cloud Computing [29].
  5. M. Arrington, “Gmail Disaster: Reports of Mass Email Deletions,” http://www.techcrunch.com/2006/12/28/gmail-disasterreports-of-mass-email-deletions/, 2006.
  6. J. Kincaid, “MediaMax/TheLinkup Closes Its Doors,” http:// www.techcrunch.com/2008/07/10/mediamaxthelinkup-closes-its-doors/, July 2008.
  7. C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans. Service Computing, vol. 5, no. 2, 220-232, Apr.-June 2012.
  8. F. Sebe, J. Domingo-Ferrer, A. Martı ´nez-Balleste, Y. Deswarte, and J.-J. Quisquater, “Efficient Remote Data Possession Checking in Critical Information Infrastructures,” IEEE Trans. Knowledge and Data Eng., vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
  9. A. Juels and J. Burton, S. Kaliski, PORs: Proofs of Retrievability for Large Files,” Proc. ACM Conf. Computer and Comm. Security (CCS’07), pp. 584-597, Oct. 2007.008.
  10. M.A. Shah, R. Swaminathan, and M. Baker, ”Privacy-Preserving Audit and Extraction of Digital Contents,” Cryptology ePrint Archive, Report 2008/186, 2
  11. H. Shacham and B. Waters,”Compact Proofs of Retrievability,” Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances), in Cryptology (Asiacrypt vol. 5350, pp. 90-107, Dec. 2008.
  12. M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan,”Auditing to Keep Online Storage Services Honest,” Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), pp. 1-6, and 2007.
  13. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, ”Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22,no. 5, pp. 847-859, May 2011.

Keywords

Data integrity, Third Party Auditing, Public Auditing, Data storage, Cloud computing, Batch verification, Zero knowledge.