Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy-Preserving in Public Auditing for Secure Cloud

G. Balamurugan, S. Alaudeen Basha, T. Parthiban


Cloud computing is used to store the data and provide the service of on demand applications without any maintenance. There is no need of longer physical maintenance for the data. Moreover, users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. Public auditability plays the major role for cloud storage. A Third-Party Auditor (TPA) can check the integrity of outsourced data and be worry free. To securely introduce an effective TPA, the auditing process should take in no new vulnerabilities toward user data privacy, and introduce no additional online burden to user. Here cloud storage system is used for the auditing purpose. It should be useful for the multi users. This design should be mainly used for the fast performance in Amazon EC2.


Data Storage, Privacy Preserving, Public Auditability, Cloud Computing, Delegation, Batch Verification.

Full Text:



C. Wang, Q. Wang, K. Ren, and W. Lou, ―Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,‖ Proc. IEEE INFOCOM ’10, Mar. 2010.

P.Mell & T. Grance, ―Draft NIST Working Definition of Cloud Computing,‖ http://csrc.Nist .gov/groups/SNS cloud computing/index.html, June 2009.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I.Stoica, and M.Zaharia, ―Above the Clouds: A Berkeley View of Cloud Computing,‖ Technical Report UCB-EECS-2009-28, Univ. of California,Berkeley, Feb. 2009.

Q.Wang, C Wang, K.Ren, W.Lou, and J.Li ―Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,‖ IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.

M.A Shah, R.Swaminathan, and M.Baker, ―Privacy-Preserving Audit and Extraction of Digital Contents,‖ Cryptology ePrint Archive, Report 2008/186, 2008.

Cloud Security Alliance, ―Security Guidance for Critical Areas of Focus in Cloud Computing,‖, 2009.

C. Wang, K.Ren, W.Lou, and J.Li, ―Towards Publicly Auditable Secure Cloud Data Storage Services,‖ IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.

C.Wang, Q.Wang, K.Ren, and W.Lou, ―Towards Secure and Dependable Storage Services in Cloud Computing,‖ IEEE Trans. Service Computing, vol. 5, no. 2, 220-232, Apr.-June 2012.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.