A Continuous Sampling Method for Batch Data Auditing in Cloud Storage

Author(s):  
Esther Daniel ◽  
Durga S. ◽  
Vijila M.

Cloud storage offers online storage services to back up data and enables easy access to real-time data at any time and on the fly. The primary issue of security arises as the data is outsourced to remote servers that cause data loss and modifications to occur. Data corruptions or misbehaviours in the cloud service providers (CSP) have to be detected at low cost and promptly. The data outsourced to CSP by the data owners might suffer from cloud service provider misbehaviour, in particular unauthorized deletion of data by CSP to save storage space towards attracting potential clients. Adapting continuous sampling of random blocks as batches reduce the computation workload on the servers, thus detecting the modifications or corruptions if any without time delays. The corrupted data blocks are located with continuous sampling methods and the probability of detection is high.

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Hanzhe Yang ◽  
Ruidan Su ◽  
Pei Huang ◽  
Yuhan Bai ◽  
Kai Fan ◽  
...  

With the rapid growth of data, limited by the storage capacity, more and more IoT applications choose to outsource data to Cloud Service Providers (CSPs). But, in such scenarios, outsourced data in cloud storage can be easily corrupted and difficult to be found in time, which brings about potential security issues. Thus, Provable Data Possession (PDP) protocol has been extensively researched due to its capability of supporting efficient audit for outsourced data in cloud. However, most PDP schemes require the Third-Party Auditor (TPA) to audit data for Data Owners (DOs), which requires the TPA to be trustworthy and fair. To eliminate the TPA, we present a Public Mutual Audit Blockchain (PMAB) for outsourced data in cloud storage. We first propose an audit chain architecture based on Ouroboros and an incentive mechanism based on credit to allow CSPs to audit each other mutually with anticollusion (any CSP is not willing to help other CSPs conceal data problems). Then, we design an audit protocol to achieve public audit efficiently with low cost of audit verification. Rigorous analysis explains the security of PMAB using game theory, and performance analysis shows the efficiency of PMAB using the real-world dataset.


2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Jian Mao ◽  
Wenqian Tian ◽  
Yan Zhang ◽  
Jian Cui ◽  
Hanjun Ma ◽  
...  

With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing), new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.


Author(s):  
VINITHA S P ◽  
GURUPRASAD E

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data.


2020 ◽  
Vol 63 (6) ◽  
pp. 927-941 ◽  
Author(s):  
A A Periola ◽  
A A Alonge ◽  
K A Ogudo

Abstract The Ocean provides benefits of free cooling for cloud computing platforms. However, the use of the ocean for hosting cloud platforms needs to consider three challenges. The first challenge is identifying suitable underwater locations for siting underwater data centres. The second is designing a low-cost method for acquiring underwater data centres. The third is designing a mechanism ensuring that the use of the ocean for hosting data centres is scalable. This paper proposes the intelligent marine compute locator (IMCL) to identify suitable locations for siting underwater data centres. The proposed IMCL determines the specific heat capacity of different ocean locations at multiple epochs. In addition, the conversion of end-of-life vessels into artificial reefs that host open-source disaggregated hardware computing payload is proposed to reduce acquisition costs. The use of disaggregated architecture enables multiple cloud service providers to use limited ocean locations. The formulated metrics are the power usage effectiveness (PUE) and ocean space utilization (OSU). Simulations show that the use of disaggregated design architecture instead of non-disaggregated architecture (existing mechanism) enhances the PUE and OSU by 4.4 and 16.4% on average, respectively.


2016 ◽  
Vol 2016 ◽  
pp. 1-7 ◽  
Author(s):  
Xinyue Cao ◽  
Zhangjie Fu ◽  
Xingming Sun

Cloud storage has been recognized as the popular solution to solve the problems of the rising storage costs of IT enterprises for users. However, outsourcing data to the cloud service providers (CSPs) may leak some sensitive privacy information, as the data is out of user’s control. So how to ensure the integrity and privacy of outsourced data has become a big challenge. Encryption and data auditing provide a solution toward the challenge. In this paper, we propose a privacy-preserving and auditing-supporting outsourcing data storage scheme by using encryption and digital watermarking. Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. Local histogram shifting digital watermark algorithm is used to protect the data integrity which has high payload and makes the original image restored losslessly if the data is verified to be integrated. Experiments show that our scheme is secure and feasible.


2020 ◽  
Vol 8 (1) ◽  
pp. 143-148
Author(s):  
K Arun Kumar ◽  
R Mohammed Harun Babu ◽  
S Kalaivanan ◽  
V Kanimozhi

Cloud depository is one of the customary supplications of the cloud computing system, which offers on-demand offloading services for both individuals and institutions. Although utilizes do not have full faith in the cloud service providers (CSPs) within that, it is hard to decide either the CSPs meet their licit expectations for data security or not. Thence, it is evaluative to come up with productive auditing techniques to boost owners’ trust and reliance in cloud storage. In this paper, we are presenting a scheme of auditing for assured cloud storage based on a 2-dimensional data structure called a dynamic hash table (DHT), used to record the data information for public auditing. This scheme emigrates the approved information from the CSP to the TPA and thereby a remarkable reduction in the computational cost and communication overhead. Also, the deduplication technology is utilized to lower the capacity and bandwidth prerequisites of the utilities by removing repetitious informati zon and stockpiles, only an original replica of them. We enhance our design encourages privacy preservation by homomorphism authenticator constructed on the public key, and attend batch auditing by aggregate BLS signature technique. Experimental results indicate that our mechanism achieves secure deduplication and tag generation improvements.


Author(s):  
Manasa Jonnagadla

Abstract: Cloud computing provides streamlined tools for exceptional business efficiency. Cloud service providers typically offer two types of plans: reserved and on-demand. Restricted policies provide low-cost long-term contracting, while order contracts are expensive and ready for short periods. Cloud resources must be delivered wisely to meet current customer demands. Many current works rely on low-cost resource-reserved strategies, which may be under- or over-provisioning. Resource allocation has become a difficult issue due to unfairness causing high availability costs and cloud demand variability. That article suggests a hybrid approach to allocating cloud services to complex customer orders. The strategy was built in two stages: accommodation stages and a flexible structure. By treating each step as an optimization problem, we can reduce the overall implementation cost while maintaining service quality. Due to the uncertain nature of cloud requests, we set up a stochastic Optimization-based approach. Our technique is used to assign individual cloud resources and the results show its effectiveness. Keywords: Cloud computing, Resource allocation, Demand


Author(s):  
R.Santha Maria Rani ◽  
Dr.Lata Ragha

Cloud computing provides elastic computing and storage resource to users. Because of the characteristic the data is not under user’s control, data security in cloud computing is becoming one of the most concerns in using cloud computing resources. To improve data reliability and availability, Public data auditing schemes is used to verify the outsourced data storage without retrieving the whole data. However, users may not fully trust the cloud service providers (CSPs) because sometimes they might be dishonest. Therefore, to maintain the integrity of cloud data, many auditing schemes have been proposed. In this paper, analysis of various existing auditing schemes with their consequences is discussed.  Keywords: — Third Party Auditor (TPA), Cloud Service Provider (CSP), Merkle-Hash Tree (MHT), Provable data Possession (PDP), Dynamic Hash Table (DHT).


2015 ◽  
Vol 713-715 ◽  
pp. 2451-2454
Author(s):  
Kai Ze Yin ◽  
Hai Hang Wang

Cloud storage as a popular application in cloud services, are developing from single cloud service provider towards multiple cloud service providers. As a consequence, users need to manage their files from different sources and share in multi-clouds. While the conventional access control models are no longer suitable in multi-clouds environment. Therefore, a multi-clouds access control model based on XACML, named MCACM, is proposed here to implement access control in multi-clouds environment. In this model, cross-clouds access control is enabled through extending standard XACML framework. At last, we implemented a prototype of MCACM, and performance evaluation results show that our scheme is efficient.


Sign in / Sign up

Export Citation Format

Share Document