Author : J.JeganAmarnath 1
Date of Publication :10th July 2019
Abstract: Storing large amounts of data with cloud service providers (CSPs) raises concerns about data protection. Data integrity and privacy can be lost because of the physical movement of data from one place to another by the cloud administrator, malware, dishonest cloud providers, or other malicious users who might distort the data. Hence, user data must be verified at regular intervals. This verification of remote (cloud) data is performed by third-party auditors (TPAs). And we also focuses on cryptographic algorithms for ensuring no privacy constraints with the third party auditor who obtain and keep the copy of user original data in encrypted form.
Reference :
-
- B. Wang, B. Li, and H. Li, “Oruta: PrivacyPreserving Public Auditing for Shared Data in the Cloud,” Proc. IEEE 5th Int’l Conf. Cloud Computing (CLOUD 12), vol. 2, no.1, 2012, pp. 295–302.
- C. Wang et al., “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. 29th Conf. Information Communications (INFOCOM 10), 2010, pp. 525–533.
- C. Wang et al., “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, 2013, pp. 362–375.
- M. Bellare, R. Caneti, and H. Krawczyk, “Keying Hash Functions for Message Authentication,” Proc. 16th Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO 96), 1996, pp. 1–15.
- M. Zhou et al., “Security and Privacy in Cloud Computing: A Survey
- K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, Jan 2012.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07, 2007, pp. 598–609.
- Juels and B. S. Kaliski, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07, 2007, pp. 584–597.
- H. Shacham and B. Waters, “Compact proofs of retrievability,” J. Cryptology, vol. 26, no. 3, pp. 442–483, Jul. 2013.
- J. Li, J. Li, D. Xie, and Z. Cai, “Secure auditing and deduplicating data in cloud,” IEEE Transactions on Computers, vol. 65, no. 8, pp. 2386–2396, Aug 2016.
- J. Hur, D. Koo, Y. Shin, and K. Kang, “Secure data deduplication with dynamic ownership management in cloud storage,” IEEE Trans.
- onKnowl. and Data Eng., vol. 28, no. 11, pp. 3113– 3125, Nov. 2016.
- G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik, “Sanitizable signatures,” in Proceedings of the 10th European Conference on Research in Computer Security, ser. ESORICS’05. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 159–177.
- G. Ateniese and B. de Medeiros, “On the key exposure problem in chameleon hashes,” in Security in Communication Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 165–179.
- Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, and K. K. R. Choo, “Fuzzy identity-based data integrity auditing for reliable cloud storage systems,” IEEE Transactions on Dependable and Secure Computing, 2017. [Online]. Available: DOI:10.1109/TDSC.2017.2662216
-
- B. Wang, B. Li, and H. Li, “Oruta: PrivacyPreserving Public Auditing for Shared Data in the Cloud,” Proc. IEEE 5th Int’l Conf. Cloud Computing (CLOUD 12), vol. 2, no.1, 2012, pp. 295–302.
- C. Wang et al., “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. 29th Conf. Information Communications (INFOCOM 10), 2010, pp. 525–533.
- C. Wang et al., “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, 2013, pp. 362–375.
- M. Bellare, R. Caneti, and H. Krawczyk, “Keying Hash Functions for Message Authentication,” Proc. 16th Ann. Int’l Cryptology Conf. Advances in Cryptology (CRYPTO 96), 1996, pp. 1–15.
- M. Zhou et al., “Security and Privacy in Cloud Computing: A Survey
- K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, Jan 2012.
- G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07, 2007, pp. 598–609.
- Juels and B. S. Kaliski, “Pors: Proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07, 2007, pp. 584–597.
- H. Shacham and B. Waters, “Compact proofs of retrievability,” J. Cryptology, vol. 26, no. 3, pp. 442–483, Jul. 2013.
- J. Li, J. Li, D. Xie, and Z. Cai, “Secure auditing and deduplicating data in cloud,” IEEE Transactions on Computers, vol. 65, no. 8, pp. 2386–2396, Aug 2016.
- J. Hur, D. Koo, Y. Shin, and K. Kang, “Secure data deduplication with dynamic ownership management in cloud storage,” IEEE Trans.
- onKnowl. and Data Eng., vol. 28, no. 11, pp. 3113– 3125, Nov. 2016.
- G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik, “Sanitizable signatures,” in Proceedings of the 10th European Conference on Research in Computer Security, ser. ESORICS’05. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 159–177.
- G. Ateniese and B. de Medeiros, “On the key exposure problem in chameleon hashes,” in Security in Communication Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 165–179.
- Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, and K. K. R. Choo, “Fuzzy identity-based data integrity auditing for reliable cloud storage systems,” IEEE Transactions on Dependable and Secure Computing, 2017. [Online]. Available: DOI:10.1109/TDSC.2017.2662216