Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Public Auditing For Secure Cloud Storage with HLA  
  Authors : M. Madhavi; O.Srinivasa Reddy; Dr. S.Sai Satyanarayana Reddy
  Cite as:

 

Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. So correctness of data and security is a prime concern. This article studies the problem of ensuring the integrity and security of data storage in Cloud Computing. Security in cloud is achieved by signing the data block before sending to the cloud. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third-party auditor (TPA) to check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacypreserving public auditing. We further extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient.

 

Published In : IJCSN Journal Volume 3, Issue 4

Date of Publication : 01 August 2014

Pages : 191 - 194

Figures : 02

Tables : --

Publication Link : Public Auditing For Secure Cloud Storage with HLA

 

 

 

M. Madhavi : M.Tech, CSE, LBRCE, Mylavaram, India

O.Srinivasa Reddy : Assistant Professor, CSE, LBRCE, Mylavaram, India

Dr. S.Sai Satyanarayana Reddy : Professor, CSE, LBRCE, Mylavaram, India

 

 

 

 

 

 

 

Cloud computing

privacy-preserving

public auditing

third-party auditor

Here we have presented a data model for secure integrity verification scheme and with data update protocol that dynamic data modification by introducing effective third Party auditor. Here we addressed two issues mainly data correctness and Public auditability which plays very important role in cloud computing features. Public auditability is to allow TPA to verify the correctness of the cloud data on demand without retrieving a copy of the whole data or introducing additional online burden to the cloud users. Storage correctness to ensure that there exists no cheating cloud server that can pass the TPA’s audit without indeed storing users’ data intact. Privacypreserving to ensure that the TPA cannot derive users data content from the information collected during the auditing process.

 

 

 

 

 

 

 

 

 

[1] CongWang ;Chow,S.S.M. ; QianWang ; KuiRen;WenjingLou “Privacy_preserving Public Auditing for Secure CloudStorage“, IEEE Transactions on Computers Volume: 62 , Issue: 2 2013 ,PP no : 362 – 375.

[2] C. Wang, Q. S.M. Chow, Kui Ren and Qian Wang, “Ensuring data storage security in cloud computing,” in December 2011.

[3] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Storage Security in Cloud Computing,” Proc. IEEE INFOCOM ’10, Mar. 2010.

[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007.

[5] M.A. Shah, R. Swaminathan, and M. Baker, “Privacy-Preserving Audit and Extraction of Digital Contents,”Cryptology ePrint Archive, Report 2008/186, 2008.

[6] C. Wang, K. Ren, W. Lou, and J. Li, “Towards PubliclyAuditable Secure Cloud Data Storage Services,” IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.

[7] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “EnablingPublic Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.

[8] C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secureand Dependable Storage Services in Cloud Computing,”IEEE Trans. Service Computing, vol. 5, no. 2, 220-232, Apr.-June 2012.