Open Access Open Access  Restricted Access Subscription or Fee Access

An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing

S.R. Nayana, G. VenifaMini, J.Jeya A Celin

Abstract


Cloud computing, hitherto a novel technology in modern computing provide the users accessibility to a gamut of resource rich pool of shared computing applications that can be accessed on demand. The cloud data storage service relieves the users from the burden of voluminous local data storage and their maintenance by outsourcing mass data to the cloud. However data outsourcing results in the users losing their physical control of data. The accuracy of data stored in cloud is of paramount importance and this was earlier accomplished by involving a trusted third party to check the integrity of the data. The introduction of a trusted third party may lead to unauthorized exposure of the stored data to other users and also tampering of data. The proposed work envisages an encrypted data integrity checking scheme without a trusted third party auditor to verify the authenticity of the data stored in the cloud by advancing the control of users over their data. This ensures that the data owners have the prospect of securing their sensitive data. This user-centric approach includes data integrity verification and data dynamics. Data Integrity is assured by using ELGAMAL public key cryptography and digital signature scheme. Data dynamics is supported by Merkle B-tree algorithm. Extensive security and performance analysis unequivocally proves that the proposed scheme is highly secure and grossly efficient.


Keywords


Authenticated Password Key Exchange, Data Integrity, ElGamal Encryption, Merkle B-Tree, Third Party Auditor.

Full Text:

PDF

References


Zhuo Hao, Sheng Zhong, Neng-Hai Yu, “A privacy preserving data integrity checking protocol with data dynamics and public verifiability ” Knowledge and Data Engineering, IEEE transactions on, vol 23, 2011,pp. 1432 - 1437

Z. Hao and N. Yu, “A multiple-replica remote data possession checking protocol with public verifiability,” in Data, Privacy, and E-Commerce, 2010.

C. Wang, Q. Wang, K. Ren, and W. Lou ”Privacy-preserving public auditing for data storage security in cloud computing ” in InfoCom2010, IEEE.

Feng Hao, Peter Ryan ,” J-PAKE: authenticated key exchange without PKI”in Transactions on computational science XI, 2010 Pages 192-206.

Li Xiao-fei, Shen Xuan-jing, Chen Hai-peng. “An Improved ElGamal Digital Signature Algorithm Based on Adding a Random Number”. In 978-0-7695-4011-5/10 $26.00 © 2010 IEEE.

Wassim Itani, Ayman Kayssi, Ali Chehab “ Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures” in Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Pages 711-716 .

C. Wang, S. S.-M. Chow, Q. Wang, K. Ren, and W. Lou,“Privacy preserving public auditing for secure cloud storage.” Cryptology ePrint Archive, Report 2009/579.

C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in CCS „09: Proceedings of the 16th ACM conference on computer and communications security , 2009, pp. 213–222.

Wang C, Wang Q, Ren K, and Lou W, “Ensuring data storage security in cloud computing,” in Proc. of IWQoS‟09, 2009.

Kyrakos Mouratidis, Dimitris Sacharidis”Partially materialized digest scheme: an efficient verification method for outsourced databases” in the international journal on very large data bases archieve,Vol 18 Issue 1, 2009,pages 363-381.

Marco Bodrato, “Public key cryptography. ElGamal, hints on implementation”, Tokyo University of Science,2008.

G. Ateniese, R. Di Pietro, L. V. Mancini, and G. sudik, “Scalable and efficient provable data possession,” in SecureComm ‟08:proceedings of 4th international conference on Security and privacy in communication networks, 2008, pp. 1–10.

Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese ”Efficient Query integrity of outsourced dynamic databases”in Proceeding of the 2012 ACM Workshop on Cloud computing security workshop, 2012, Pages 71-82

F.Sebe,J.Domigo-Ferrer,A.Martinez-Balleste et.al “Efficient remote data possession checking in critical information infrastructures”, IEEE Transactions on, vol. 20, 2008,pp. 1034-1038.

G. Atneiese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,”Provable data possession at untrusted stores” in CCS ‟07: Proceedings of the 14th ACM conference on Computer and communications security, pp. 598-609.

Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L “Dynamic authenticated index structures for outsourced databases.” In: SIGMOD Conference, 2006, pp. 121–132

Andreas .V.Meier, “The ElGamal Cryptosystem” 2005.

Katz, J., Ostrovsky, R., Yung, M. :”Efficient password-authenticated key exchange using human-memorable passwords”. In: Pfitzmann, B. (ed.) EUROCRYPT 2001.LNCS, vol. 2045, 2001, pp. 475–494. Springer, Heidelberg.

M. Naor and M. Yung. “Universal One-Way Hash Functions and Their Cryptographic Applications”, 1989, STOC '89.

R.C. Merkle, “Protocols for public key cryptosystems” Proc. Of IEEE Symposium on Security and Privacy‟80, 1980, pp. 122–133.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.