Open Access Open Access  Restricted Access Subscription or Fee Access

Bilinear Aggregate Signature and PDP Encryption in Audit Service for Cloud Storage

B. Premkumar, R.S. Ponmagal

Abstract


Cloud-based outsourced storage relieves the client’s burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. Provable data possession (PDP), which is a cryptographic technique for verifying the integrity of data without retrieving it at a distrusted server, can be used to realize audit services. We prove that our construction holds these properties based on the computation Diffie–Hellman assumption and the rewind able black-box knowledge extractor. We also propose an efficient mechanism with respect to probabilistic queries and periodic verification to reduce the audit costs per verification and implement abnormal detection timely. In addition, we present an efficient method for selecting an optimal parameter value to minimize computational overheads of cloud audit services. Our experimental results demonstrate the effectiveness of our approach. This kind of outsourced storage services in clouds have become a new profit growth point by providing a comparably low-cost and scalable.

Keywords


Provable Data Possession, Audit Services, Probabilistic Queries, Periodic Verification

Full Text:

PDF

References


Armando Fox, Michael Armbrust “A view on cloud computing” IEEE/ACM Trans. Networking, 2010.

Beuchat J.L., Brisebarre, N., Detrey, J., Okamoto, E. “Arithmetic Operators for Pairing-Based Cryptography” Internet Engineering Task Force, RFC 896, 2007.

Ramya Sree Uppalapati, K.Nagi Reddy “Achievement of liability, Auditability and reliance in cloud computing” Internet Engineering Task Force, RFC 896, 2011.

D. Kumuthavijay, J. Nandhini, V. Jayaprakasan “Implementation of Efficient Audit Service Outsourcing for Data Integrity by Interfacing the Mobile Device in Clouds” ACM Comput. Commun. Rev., 2013.

Dan Boneh, Matt Franklin “Identity-Based Encryption from the Weil Pairing” ACM Comput. Commun. Rev., 2011.

Jianying Zhou and Moti Young, “Applied Cryptography and Network Security”, Springer 2005

G.Ateniese . R.Burns, R.Curtmola,J.Herring and D.Song, “Provable Data Possession at Untrusted Stores”, in CCS, pp. 598-609,ACM, 2007

Henk C.A van Tilborg, “Encyclopedia of Cryptography and Security”, Springer 2005

G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Fourth Int’l Conf. Security and Privacy in Comm. Netowrks (SecureComm), pp. 1-10, 2008.

C.C. Erway, A. Ku¨ pc¸u¨ , C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security, pp. 213-222, 2009.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 1-9, 2010.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.