Cloud Dynamic and Public Auditing Scheme for Secure Data by using RSA with Modified Dynamic Hash Table
Keywords:
Cloud Computing, Cloud Auditing, Modified Dynamic Hash Table, Data Integrity, Computation CostAbstract
Users are able to host and access a broad variety of internet-based services thanks to a paradigm for distributed computing that is known as "cloud computing." It sees widespread deployment in corporate applications like as data storage and internet-based software programmes. Users of cloud storage services are able to access their personal information whenever they want and from any place they want since they are not required to keep the data locally. The cloud service provider, on the other hand, does not put their whole faith in cloud storage since the integrity of the data is reviewed on unstable cloud servers. A significant amount of research has been conducted in public auditing with the goal of lowering the amount of computation time required for the integrity check. The method that is used the most has low costs associated with the processing but offers no security. In the work that we have suggested, a component known as the Cloud Auditor (CA) is responsible for carrying out the task of monitoring any changes that may have been made to the block by an external hacker; original data is obtained from its cache record. The TPA is where the data information required for dynamic auditing is stored, and it is recorded in the TPA's modified dynamic hash table (MDHT). The information is encrypted via the MRSA algorithm, which is a modified version of the RSA algorithm. The MDHT is not the same as a dynamic hash table since the former does not include a tag block while the later does. The cost of calculating the MDHT is analysed, then compared to other approaches that are currently being used. The results of the experiments showed that the MDHT method has a reduced computation cost compared to the most current public auditing methodologies.
Downloads
References
Wang, B., Li, B. and Li, H., 2015. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on services computing, 8(1), pp.92-106.
Fu, A., Yu, S., Zhang, Y., Wang, H. and Huang, C., 2017. NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transactions on Big Data.
Liu, C., Chen, J., Yang, L.T., Zhang, X., Yang, C., Ranjan, R. and Kotagiri, R., 2014. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), pp.2234-2244.
Liu, C., Ranjan, R., Yang, C., Zhang, X., Wang, L. and Chen, J., 2015. MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Transactions on Computers, 64(9), pp.2609-2622.
Thangavel, M. and Varalakshmi, P., 2018. Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud. Cluster Computing, 21(2), pp.1411-1437.
Yuan, J. and Yu, S., 2015. Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Transactions on Information Forensics and Security, 10(8), pp.1717-1726.
Youn, T.Y., Chang, K.Y., Rhee, K.H. and Shin, S.U., 2018. Efficient client-side deduplication of encrypted data with public auditing in cloud storage. IEEE Access, 6, pp.26578-26587.
Tian, H., Nan, F., Jiang, H., Chang, C.C., Ning, J. and Huang, Y., 2019. Public auditing for shared cloud data with efficient and secure group management. Information Sciences, 472, pp.107-125.
Yu, J., Ren, K., Wang, C. and Varadharajan, V., 2015. Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information forensics and security, 10(6), pp.1167-1179.
Shen, J., Shen, J., Chen, X., Huang, X. and Susilo, W., 2017. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and Security, 12(10), pp.2402-2415.
D. Chattaraj, M. Sarma, and A.K. Das, “A new two-server authentication and key agreement protocol for accessing secure cloud services”, Computer Networks, vol.131, pp.144-164, 2018.
J. Brogan, I. Baskaran, and N. Ramachandran, (2018). “Authenticating health activity data using distributed ledger technologies”. Computational and Structural Biotechnology Journal, 16, 257-266.
Razaque, and S.S. Rizvi, “Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment”, Computers & Security, vol.62, pp.328-347, 2016.
H. Zhang, and T. Tu "Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree." IEEE Transactions on Services Computing, 2017.
G. Sharma, and S. Kalra, “Identity based secure authentication scheme based on quantum key distribution for cloud computing”, Peer-to-Peer Networking and Applications, vol.11, no.2, pp.220-234, 2018.
Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y. and Liu, J., 2017. Dynamic-hash-table based public auditing for secure cloud storage. IEEE Transactions on Services Computing, 10(5), pp.701-714.
Erway, C.C., Küpçü, A., Papamanthou, C. and Tamassia, R., 2015. Dynamic provable data possession. ACM Transactions on Information and System Security (TISSEC), 17(4), p.15.
Wang, Q., Wang, C., Ren, K., Lou, W. and Li, J., 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22(5), pp.847-859.
Zhu, Y., Ahn, G.J., Hu, H., Yau, S.S., An, H.G. and Hu, C.J., 2013. Dynamic audit services for outsourced storages in clouds. IEEE Transactions on Services Computing, 6(2), pp.227-238.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.