Open Access Open Access  Restricted Access Subscription or Fee Access

Content Auditing in the Cloud Environment

R. Emad El-Dein, B. Youssef, S. ElGamal

Abstract


Cloud computing is a new computing paradigm that enables organizations and users to store data in a highly available space of different shared applications and services, instead of storing and managing their data on the company's local server. There are some challenges that face cloud users when they use cloud storage services like inability of accessing their data physically, so if the user doesn't know the Cloud Service Provider (CSP), malicious activity on untrusted servers can alter or destroy their data and applications. As a conclusion content auditing, must be a requirement, a scheduled check for data is done as a correction purpose and this method is called data integrity. This paper proposed a model that provides content auditing of cloud user data which can be personal data or web pages by periodically checks data integrity by using keyed hashing algorithms and check trustiness of Cloud Service Provider, finally ensure the fast recovery of data.


Keywords


Auditing, Cloud Computing, Cloud Storage, Cloud Service Provider (CSP), Content Auditing, Data Integrity, Keyed Hashing Algorithms.

Full Text:

PDF

References


C. Chris Erway, A. Küpçü, C. Papamanthou and R.Tamassia, " Dynamic Provable Data Possession", ACM Transactions on Information and System Security (TISSEC): Vol. 17, April 2015.

C. Erway, A. Küpçü, C. Papamanthou and R. Tamassia, "Dynamic provable data possession", CCS '09:Proceedings of the 16th ACM conference on Computer and communications security, pp. 213-222 , November 2009.

C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditingfor secure cloud storage", Computers, IEEE Transactions, pp. 362–375, Feb 2013.

D. Attas, O. Batrafi,"Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing", International Journal ofElectrical & Computer Sciences IJECS-IJENS, Vol. 11, pp. 41-45, 2011.

Dr. NEDHAL A. AL-SAIYD, N. SAIL, "DATA INTEGRITY IN CLOUD COMPUTING SECURITY", Journal of Theoretical and Applied Information Technology, Vol. 58, pp. 570-581, December 2013.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," in Proceedings of 14th ACM Conf. Computer and Comm. Security (CCS ’07), 2007.

G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession", in Proceedings of SecureComm ’2008.

Jagtap V. V., Aher S.M., "Audit Service by Using TPA for Checking Data Integrity in Cloud System", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3, pp. 269-274, April 2014.

K. Yang, X. Jia, " Data storage auditing service in cloud computing: challenges, methods and opportunities", Springer, World Wide Web (2012), pp. 409:428, 2012.

K.D. Bowers, A. Juels, and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", in Proceedings of 16th ACM conference on Computer and communications security, 2009.

Krathika A, "Approved TPA along with Integrity Verification in Cloud", International Journal of Computer Applications Technology and Research, Vol. 5, pp. 292 - 294, 2016.

M. S.Giri, B. Gaur and D. Tomar, "A Survey on Data Integrity Techniques in Cloud Computing", International Journal of Computer Applications, Vol. 122, No.2, pp. 27-32, July 2015.

N. Garg, S. Bawa, "Comparative analysis of cloud data integrity auditing protocols ", Journal of Network and Computer Applications, Vol. 66, pp. 17-32, May 2016.

P. Rathod, S. Sapkal, "Audit Service for Data Integrity in Cloud ", International Journal of Advanced Research in Computer Science andSoftware Engineering, Vol. 4, pp. 288-292, April 2014.

S. G. Worku, Z. Ting, and Q. Zhi-Guang, "Survey on cloud data integrity proof techniques", in Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference on, pp. 85–91, Aug 2012.

U. Santosh A, V. Milindkumar B, " Privacy Preservation and Integrity Auditing In Cloud Storage or web server", International Journal of Emerging Technology and Advanced Engineering, Vol. 5, pp. 376-383, January 2015.

W. Amol D., V. Rastogi, "Data Integrity Auditing of Cloud Storage", International Journal of Computer Applications, Vol. 133, No.17, pp. 17-21, January 2016.

Y. Yu, L. Xue, M. Ho Au, W. Susilo, J. Ni, Y. Zhang, A. V. Vasilakos and J. Shen, "Cloud data integrity checking with an identity-based auditing mechanism from RSA", Future Generation Computer Systems, ScienceDirect, Vol. 62, pp. 85-91,September 2016.

Cloud Security Alliance, Top Threats to Cloud Computing, 2010. http://www.cloudsecurityalliance.org.

B. Reddy Kandukuri, R. Paturi V and Dr. Atanu Rakshit, "Cloud Security Issues”, in Proceedings IEEE International Conference on Services Computing, September 2009.

https://en.wikipedia.org/wiki/Data_compression, 15/9/2016.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.