CFP last date
22 April 2024
Reseach Article

Privacy Preserving Third Party Auditing for Secure Cloud Storage

by Swati B. Ghavle, B. M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 18
Year of Publication: 2018
Authors: Swati B. Ghavle, B. M. Patil
10.5120/ijca2018917877

Swati B. Ghavle, B. M. Patil . Privacy Preserving Third Party Auditing for Secure Cloud Storage. International Journal of Computer Applications. 181, 18 ( Sep 2018), 49-53. DOI=10.5120/ijca2018917877

@article{ 10.5120/ijca2018917877,
author = { Swati B. Ghavle, B. M. Patil },
title = { Privacy Preserving Third Party Auditing for Secure Cloud Storage },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 181 },
number = { 18 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 49-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number18/29967-2018917877/ },
doi = { 10.5120/ijca2018917877 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:53.652552+05:30
%A Swati B. Ghavle
%A B. M. Patil
%T Privacy Preserving Third Party Auditing for Secure Cloud Storage
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 18
%P 49-53
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With cloud data services, it is possible to all or common place for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to misconception due to the existence of hardware/software failures and human errors. To allow both data owners and public verifiers several mechanisms have been designed for efficiently auditing cloud data integrity without retrieving the entire data from the cloud server. However, public auditing on the integrity of shared data with these previously existing mechanisms will inevitably reveal confidential information, identity & privacy to public verifiers. In this work a novel privacy-preserving mechanism used to supports public auditing on shared data stored in the cloud. In particular, here exploit ring signatures is used which computes verification of metadata on user demand and audit the correctness of shared data.

References
  1. B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf. Cloud Computing, pp. 295-302, 2012
  2. M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. H.Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.
  3. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2007, pp. 598–610.
  4. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” in Proc. IEEE International Conference on Computer Communications (INFOCOM), 2010, pp. 525–533.
  5. R. L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret,” in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). SpringerVerlag, 2001, pp. 552–565.
  6. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” in Proc. International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, 2003, pp. 416–432.
  7. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). SpringerVerlag, 2008, pp. 90–107.
  8. K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  9. B.Wang, M. Li, S.S. Chow, and H. Li, “Computing Encrypted Cloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf. Comm. and Network Security (CNS ’13), pp. 90-99, 2013.
  10. R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems,” Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978.
  11. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,“ Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), pp. 213-222, 2009.
  12. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS’09), pp. 1-9, 2009.
  13. C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
  14. B.Wang, B. Li, and H. Li, “Public Auditing for Shared Data with Efficient User Revocation in the Cloud,” Proc. IEEE INFOCOM, pp. 2904-2912, 2013.
  15. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” Proc. 22ndInt’l Conf. Theory and Applications of Cryptographic Techniques: Advances in Cryptology (EUROCRYPT’03), pp. 416-432 July 2003.
  16. Juels, B. Kaliski. “Pors: proofs of retrievability for large files[C]”, Proceedings of CCS 2007. Alexandria, VA, USA, 2007. 584-597.
  17. Abhishek Mohta, Lalit Kumar Awasti, “Cloud Data Security while using Third Party Auditor”, International Journal of Scientific & Engineering Research, Volume 3,Issue 6, ISSN 2229-8 June 2012.
  18. D. Shrinivas, “Privacy-Preserving Public Auditing in Cloud Storage security”, International Journal of computer science and Information Technologies, vol 2, no. 6, pp. 2691-2693, ISSN: 0975-9646, 2011.
  19. K Govinda, V. Gurunathprasad and H. sathishkumar, “Third Party Auditing for Secure Data Storage in Cloud Through Digital Signature Using RSA”, International Journal of Advanced science and Technical Research, vol4,no. 2, ISSN: 2249-9954,4 August 2012.
  20. Balkrishnan. S, Saranya. G, Shobana. S and KarthikeyanS, “Introducing Effective Third Party Auditing (TPA) for Data Storage Security in Cloud”, International Journal of computer science and Technology, vol. 2, no. 2, ISSN2229-4333 (Print) | ISSN: 0976-8491(Online), June 2012.
  21. Yu, S., Wang, C., Ren, K., & Lou, W. (2010). Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. 2010 Proceedings IEEE INFOCOM. doi:10.1109/infcom.2010.5462174.
Index Terms

Computer Science
Information Sciences

Keywords

Public auditing privacy-preserving shared data cloud computing ring signature data integrity.