Open Access Open Access  Restricted Access Subscription or Fee Access

Providing Secured Data Storage by Privacy and Third Party Auditing in Cloud

Lingaraj Dhabale, Priti Pavale

Abstract


Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud for the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in Cloud Computing a very challenging and potentially formidable task, especially for users with constrained computing resources and capabilities. Thus, enabling public audit ability for cloud data storage security is of critical importance so that users can resort to an external audit party to check the integrity of outsourced data when needed. To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user data privacy.

Keywords


Cloud computing,Providing Secured Data Storage,cloud service providers

Full Text:

PDF

References


Cong Wang, Qian Wang, Kui Ren and Wenjing Lou, ―Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing‖ This paper was presented as part of the main Technical Program at IEEE INFOCOM 2010.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable data possession at untrusted stores,‖ Cryptology ePrint Archive, Report 2007/202, 2007, http://eprint.iacr.org/.

M. A. Shah, R. Swaminathan, and M. Baker, ―Privacy-preserving audit and extraction of digital contents,‖ Cryptology ePrint Archive, Report 2008/186, 2008, http://eprint.iacr.org/.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, ―Enabling public verifiability and data dynamics for storage security in cloud computing,‖ in Proc. of ESORICS’09, Saint Malo, France, Sep. 2009.

H. Shacham and B. Waters, ―Compact proofs of retrievability,‖ in Proc. of Asiacrypt 2008, vol. 5350, Dec 2008, pp. 90–107

A. Juels and J. Burton S. Kaliski, ―Pors: Proofs of retrievability for large files,‖ in Proc. of CCS’07, Alexandria, VA, October 2007, pp. 584–597.

M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, ―Auditing to keep online storage services honest,‖ in Proc. of HotOS’07. Berkeley, CA, USA: USENIX Association, 2007, pp. 1–6.

Shucheng .Y, C. Wang, K. Ren, and W. Lou, ―Achieving secure, scalablea,nd fine- rained access control in cloud computing,‖ in Proc. Of IEEE INFOCOM’1 0 ,San Diego, CA, USA, March 2010

C. Wang, Q. Wang, K. Ren, and W. Lou, ―Ensuring data storage security in cloud computing,‖ in Proc. of IWQoS’09, July 2009.

C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, ―Dynamic provable data possession,‖ in Proc. of CCS’09, 2009


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.