Title :
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext
Author :
Zaid Alaa Hussien;Hai Jin;Zaid Ameen Abduljabbar;Ali A. Yassin;Mohammed Abdulridha Hussain;Salah H. Abbdal;Deqing Zou
Author_Institution :
Cluster and Grid Computing Laboratory, Services Computing Technology and System Laboratory, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China
Abstract :
Outsourced data in cloud and computation results are not always trustworthy because data owners lack physical possession and control over the data as a result of virtualization, replication, and migration techniques. Protecting outsourced data from security threats has become a challenging and potentially formidable task in cloud computing; hence, many schemes have focused on ameliorating this problem and on enabling public auditability for cloud data storage security. These schemes drop into two categories: total computation cost and burden on client side. Researchers have used bilinear map technology with public key cryptography. Although this technology is highly efficient, computation time is long and overhead cost is high. The client needs to perform numerous computations to ensure the integrity of data storage. To reduce auditing cost, we propose an efficient and robust scheme to maintain data integrity in cases that involve public auditing. Our scheme adopts modern cipher cryptography with a cryptographic hash function. We consider allowing a third party auditor to preprocess data on behalf of cloud users before uploading them to cloud service providers and then verifying data integrity afterward. Our proposed scheme has important security characteristics, such as privacy, key management, low cost computation, key exchange, low overhead cost, no burden on client side, inability of cloud service providers to create correct verifier respond without data, and one-time key. Finally, efficiency analysis shows that our scheme is faster and more cost-efficient than the bilinear map-based scheme.
Keywords :
"Cloud computing","Cryptography","Memory","Metadata","Outsourcing","Protocols"
Conference_Titel :
Information Assurance and Security (IAS), 2015 11th International Conference on
DOI :
10.1109/ISIAS.2015.7492748