Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing
Keywords:
Data Storage, Privacy-Preserving, Public Review Ability, Cryptographic Protocols, Cloud ComputingAbstract
Many users store their data in the cloud storage and benefit from high quality applications and services from a common group of configurable computing resources like networks, servers, storage, applications, and services, by these users can avoid the load of local data storage and protection. However, the fact that users no longer have physical control of the large size of data makes data reliability protection in Cloud computing a challenging task, especially for users with constrained computing resources. Cloud computing is used by many software industries nowadays, since security is not provided in cloud, many companies adopt their unique security structure. To avoid this problem, users can route data to a third party auditor (TPA) he can check the integrity of rooted data.TPA can be securely introduced such that the auditing process should not create any problems towards user data privacy, and should not bring in no added load to user. In this paper, we are securing the user data and providing privacy. We further expand the TPA to carry out multiple auditing tasks concurrently and powerfully. Wide-range of security and performance investigation shows the proposed schemes are provably secure and highly efficient.
References
. P. Mell, T. Grance, “The NIST Definion of Cloud Computing”, National Institute of Standards and Technology, Vol.53, Issue.6, pp.1-50, 2009.
. M. Armbrust, A. Fox, R. Griffith, AD. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, “ A view of cloud computing”, Communications of the ACM, Vol.53, Issue.4, pp.50-58, 2010.
. M. Bellare, P. Rogaway, “Random oracles are practical: A paradigm for designing efficient protocols”, In First Conference on Computer and Communications Security, USA, pp. 62-73, 1993.
. A. Hirne, S. Namdev, H.S. Tomar, "Secure Data Distribution in Cloud Environment Using Key Aggregation Cryptic", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.2, pp.15-19, 2016.
. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores”, Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, pp. 598–609, 2007.
. C Wang, SSM Chow, Q Wang, K Ren, W. Lou, “Privacy-preserving public auditing for secure cloud storage”, IEEE transactions on computers, Vol.62, Issue.2, pp.362-75, 2013.
. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proc. of ESORICS’09 (volume 5789 of LNCS Springer-Verlag), pp. 355–370, 2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
