Remote Data Auditing Scheme in Secured Cloud Storage Environment
نویسنده
چکیده
Cloud data centers are used to maintain the shared data values for the data owners .Data owners and public verifiers are involved to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and block signatures are used in the integrity verification process. Public data auditing schemes are tuned to verify the encrypted cloud storage environment. “One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch auditing mechanism supports to perform multiple auditing tasks simultaneously.Oruta is compatible with random masking to preserve data privacy from public verifiers. Dynamic data management process is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism sequence is not managed by the system. The system obtains high computational overhead.Privacy preserved data verification techniques are applied on the cloud data centers to check the encrypted data values. Traceability features are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of the signer based on verification metadata. Data version management mechanism is integrated with the system.
منابع مشابه
A Metadata Verification Scheme for Data Auditing in Cloud Environment
Cloud, being the most vulnerable next generation architecture consists of two major design elements i.e. the cloud service provider and the client. The architecture shifts data, applications and development environments to large data centers thereby providing storage, software and platform services online. The notion on verifying data for intactness is termed as data auditing and the process is...
متن کاملIntegrity Auditing with Homomorphic Encryption for Dynamic Cloud with Group user Revocation
With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secur...
متن کاملA Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage
Cloud storage service, which enables users to store the data in the remote cloud and to access to it over the Internet regardless of location and time, is an important development trend in information technologies. This cloud storage provides on-demand high quality storage and computing resources, but it also introduces new security challenges. Thus, an auditing service is desired to convince u...
متن کاملBatch Auditing for Multiclient Data in Multicloud Storage
Cloud storage enables users to outsource their data to cloud servers and enjoy the on-demand high-quality services. However, this new paradigm also introduces many challenges due to the security and integrity threats toward user’ outsourced data. Recently, various remote integrity auditing methods have been proposed, but most of them can only serve for the single cloud environment or the indivi...
متن کاملSecrecy Maintenance Public Auditing towards Regenerating-Code supported Cloud Storage
data and to be protected against corruptions. To preserves this outsourced data against error it becomes critical to add fault tolerance along with failure reparation and integrity checking of data to cloud storage. Newly regenerating codes because of its lower repair bandwidth have acquired popularity which also provides fault tolerance. The existing method for regenerating-codes that is remot...
متن کامل