Cloud Dynamic and Public Auditing Scheme for Secure Data by using RSA with Modified Dynamic Hash Table

Authors

  • A. Ahadha Parveen Department of Computer Science, National College (Affiliated to Bharathidasan University), Trichy, Tamil Nadu, India,620020
  • P. S. S. Akilashri Department of Computer Science, National College (Affiliated to Bharathidasan University), Trichy, Tamil Nadu, India,620020

Keywords:

Cloud Computing, Cloud Auditing, Modified Dynamic Hash Table, Data Integrity, Computation Cost

Abstract

Users are able to host and access a broad variety of internet-based services thanks to a paradigm for distributed computing that is known as "cloud computing." It sees widespread deployment in corporate applications like as data storage and internet-based software programmes. Users of cloud storage services are able to access their personal information whenever they want and from any place they want since they are not required to keep the data locally. The cloud service provider, on the other hand, does not put their whole faith in cloud storage since the integrity of the data is reviewed on unstable cloud servers. A significant amount of research has been conducted in public auditing with the goal of lowering the amount of computation time required for the integrity check. The method that is used the most has low costs associated with the processing but offers no security. In the work that we have suggested, a component known as the Cloud Auditor (CA) is responsible for carrying out the task of monitoring any changes that may have been made to the block by an external hacker; original data is obtained from its cache record. The TPA is where the data information required for dynamic auditing is stored, and it is recorded in the TPA's modified dynamic hash table (MDHT). The information is encrypted via the MRSA algorithm, which is a modified version of the RSA algorithm. The MDHT is not the same as a dynamic hash table since the former does not include a tag block while the later does. The cost of calculating the MDHT is analysed, then compared to other approaches that are currently being used. The results of the experiments showed that the MDHT method has a reduced computation cost compared to the most current public auditing methodologies.

Downloads

Download data is not yet available.

References

Wang, B., Li, B. and Li, H., 2015. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on services computing, 8(1), pp.92-106.

Fu, A., Yu, S., Zhang, Y., Wang, H. and Huang, C., 2017. NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transactions on Big Data.

Liu, C., Chen, J., Yang, L.T., Zhang, X., Yang, C., Ranjan, R. and Kotagiri, R., 2014. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), pp.2234-2244.

Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L. and Chen, J., 2015. MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Transactions on Computers, 64(9), pp.2609-2622.

Thangavel, M. and Varalakshmi, P., 2018. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Computing, 21(2), pp.1411-1437.

Yuan, J. and Yu, S., 2015. Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Transactions on Information Forensics and Security, 10(8), pp.1717-1726.

Youn, T.Y., Chang, K.Y., Rhee, K.H. and Shin, S.U., 2018. Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access, 6, pp.26578-26587.

Tian, H., Nan, F., Jiang, H., Chang, C.C., Ning, J. and Huang, Y., 2019. Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, pp.107-125.

Yu, J., Ren, K., Wang, C. and Varadharajan, V., 2015. Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information forensics and security, 10(6), pp.1167-1179.

Shen, J., Shen, J., Chen, X., Huang, X. and Susilo, W., 2017. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and Security, 12(10), pp.2402-2415.

D. Chattaraj, M. Sarma, and A.K. Das, “A new two-server authentication and key agreement protocol for accessing secure cloud services”, Computer Networks, vol.131, pp.144-164, 2018.

J. Brogan, I. Baskaran, and N. Ramachandran, (2018). “Authenticating health activity data using distributed ledger technologies”. Computational and Structural Biotechnology Journal, 16, 257-266.

Razaque, and S.S. Rizvi, “Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment”, Computers & Security, vol.62, pp.328-347, 2016.

H. Zhang, and T. Tu "Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree." IEEE Transactions on Services Computing, 2017.

G. Sharma, and S. Kalra, “Identity based secure authentication scheme based on quantum key distribution for cloud computing”, Peer-to-Peer Networking and Applications, vol.11, no.2, pp.220-234, 2018.

Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y. and Liu, J., 2017. Dynamic-hash-table based public auditing for secure cloud storage. IEEE Transactions on Services Computing, 10(5), pp.701-714.

Erway, C.C., Küpçü, A., Papamanthou, C. and Tamassia, R., 2015. Dynamic provable data possession. ACM Transactions on Information and System Security (TISSEC), 17(4), p.15.

Wang, Q., Wang, C., Ren, K., Lou, W. and Li, J., 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22(5), pp.847-859.

Zhu, Y., Ahn, G.J., Hu, H., Yau, S.S., An, H.G. and Hu, C.J., 2013. Dynamic audit services for outsourced storages in clouds. IEEE Transactions on Services Computing, 6(2), pp.227-238.

Downloads

Published

23.02.2024

How to Cite

Parveen, A. A. ., & Akilashri, P. S. S. . (2024). Cloud Dynamic and Public Auditing Scheme for Secure Data by using RSA with Modified Dynamic Hash Table. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 294–303. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4875

Issue

Section

Research Article