An Efficient Privacy Preserving Public Auditing Mechanism for Secure Cloud Storage
نویسندگان
چکیده
one of the services provided by the cloud environment is cloud storage which allows users to store, remotely manage and access their data over the internet. However, the limited control granted to users over remote cloud nodes makes users worry about the integrity of their data as the user’ data can be accessed or modified by external attackers. Therefore, a new terminology called data auditing has been evolved to allow users to use cloud storage as they use their local storage without worrying about the integrity of their data. In order to achieve the auditing task, users can resort to an independent entity called Third Party Auditor (TPA) rather than putting the burden of the auditing task on the users themselves. The job of the TPA is to monitor the modifications, deletions, and insertions made on the user’s data. However, using a TPA can endanger the data privacy and hence a privacy preserving TPA is required. In this paper, we have designed and implemented a cloud storage framework which includes an efficient TPA with main objective is to provide the public data auditing service while preserving the data privacy. Also, it can act as an intermediary between the data owner and the cloud service provider through which the users can upload, access, modify, delete, and audit their data while maintaining its privacy. The proposed auditing protocol is based on using two well-known encryption techniques, namely, message digest algorithm 5 (MD5) and advanced encryption standard (AES). Also, the TPA allows the users to store their data on multiple clouds to enhance the availability of data. A set of experiments have been conducted to evaluate the performance of the proposed public auditing mechanism.
منابع مشابه
Secure and efficient privacy-preserving public auditing scheme for cloud storage
Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...
متن کاملSolving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...
متن کاملRecord Maintenance and Secure Preserving Of Shared Data in Public Auditing
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کاملPrivacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code
Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...
متن کاملPreserving privacy for secure and outsourcing for Linear Programming in cloud computing
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. we utilize the public key based homomorphism aut...
متن کاملPrivacy-Preserving Public Auditing for Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, es...
متن کامل