Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


DYBACON: An Auditor for Secure Kinetic Cloud Storage

G. Soniya Priyatharsini and P. Visu
Department of CSE, Vel Tech University, Avadi, Chennai-62, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology  2015  1:70-78
http://dx.doi.org/10.19026/rjaset.11.1677  |  © The Author(s) 2015
Received: February ‎27, ‎2015  |  Accepted: March ‎20, ‎2015  |  Published: September 05, 2015

Abstract

Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Cloud server provides a low cost, flexible, location independent platform for storing client's data. It can provide user along with varieties of service, framework, applications and storage of a huge amount of data; it includes information which is important. Along with the capabilities of the cloud computing, its security is the biggest question mark. It needs associate an independent third party auditing service to see the data integrity within the cloud server. Already past integrity checking methods will solely serve for static archive data and so cannot be applied to the auditing service since the data within the cloud may be dynamically updated. To combine the security drawback, this study proposes a secured protocol. This study initially sketch a frame for an auditing protocol, then extend the protocol to support dynamic auditing and batch auditing for each multiple clouds and multiple owners. With the support of ILEDM, this study is tracking the recent upgrades of the data within the cloud. So the replay attack can be reduced. The analysis and simulation results show that this projected auditing protocols are secure and dynamic, significantly it reduce the value of the computation of the auditor.

Keywords:

Cloud security, dynamic cloud data security, third party auditor,


References

  1. Al-Attab, B.S. and H.S. Fadewar, 2014. Security issues and challenges in cloud computing. Int. J. Emerg. Sci. Eng., 2(7), ISSN: 2319-6378.
  2. Ateniese, G., R.D. Pietro, L.V. Mancini and G. Tsudik, 2008. Scalable and efficient provable data possession. Cryptology ePrint Archive, Report 2008/114 (2008).
    CrossRef    
  3. Cong, W., S.S.M. Chow, W. Qian, R. Kui and L. Wenjing, 2013. Privacy-preserving public auditing for secure cloud storage. IEEE T. Comput., 62(2).
    CrossRef    
  4. ENISA, 2011. Survey and analysis of security parameters in cloud SLAs across the European public sector. Survey and analysis. SLAs Survey Report, European Network and Information Security Agency.
  5. Erway, C.C., A. Ku pc�u , C. Papamanthou and R. Tamassia, 2009. Dynamic provable data possession. Proceeding of the 16th ACM Conference on Computer and Communication Security, pp: 213-222.
    CrossRef    
  6. Filho, D.L.G. and P.S.L.M. Barreto, 2006. Demonstrating data possession and uncheatable data transfer. IACR Cryptology ePrint Archive, Report2006/150, 2006, Retrieved from: http://eprint.iacr.org/.
  7. Harfoushi, O., B. Alfawwaz, N.A. Ghatasheh, R. Obiedat, M. Mua�ad and H. Faris, 2014. Data security issues and challenges in cloud computing: A conceptual analysis and review. Commun. Network, 6: 15-21.
    CrossRef    
  8. Hemalatha, S. and R. Manickachezian, 2014. Dynamic auditing protocol using improved RSA and CBDH for cloud data storage. Int. J. Adv. Res. Comput. Sci. Softw. Eng., 4(1).
  9. Juels, A. and B.S.K. Jr., 2007. PORs: Proofs of retrievability for large files. In: Ning, P., S.D.C. di Vimercati and P.F. Syverson (Eds.), proceeding of the ACM Conference on Computer and Communications Security, ACM, pp: 584-597.
    CrossRef    
  10. Kalaiarasi, V., R. Gugapriya, K. Nirmaladevi and Mr. P. Anandhajayam, 2014. Detecting and eliminating fraudulence using cloud storage. Proceeding of the International Conference on Engineering Technology and Science (ICETS�14).
  11. Kan, Y. and J. Xiaohua, 2012. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE T. Parall. Distrib., 24(9): 1717-1726.
    CrossRef    
  12. Khalil, I.M., A. Khreishah and M. Azeem, 2014. Cloud computing security: A survey. Computers, 3: 1-35.
    CrossRef    
  13. Koteeswaran, S., J. Janet, E. Kannan and P. Visu, 2012. Terrorist intrusion monitoring system using outlier analysis based search knight algorithm. Eur. J. Sci. Res., 74(3): 440-449.
  14. Madhuri, R.R. and S.B. Natikar, 2014. Providing data utility on cloud using slicing approach and dynamic auditing protocol using third party auditor to maintain integrity of data. Int. J. Comput. Sci. Inf. Technol., 5(1).
  15. Mehdi, S., A. Adnan, G. Abdullah, K.K. Muhammad and B.A. Nor, 2014. Towards dynamic remote data auditing in computational clouds. Sci. World J., 2014: 12.
  16. Monalisa Devi, N.S. and T. Sounder Rajan, 2014. Secure Auditing for outsourced data in cloud using homomorphic token and erasure code. Int. J. Innov. Res. Comput. Commun. Eng., 2(1): 2086-2091.
  17. Naseem, S. and A.B. Sasankar, 2014. Cloud computing challenges and related security issues. Proceeding of the International Conference on Advances in Engineering and Technology (ICAET-2014), pp: 19-23.
  18. Ning, C., 2012. Secure and reliable data outsourcing in cloud computing. Ph.D. Thesis, Faculty of the Worcester Polytechnic Institute.
  19. Ohmin, K., K. Dongyoung, S. Yongjoo and Y. Hyunsoo, 2014. A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J., 2014: 10.
  20. Pasupathi, K. and D. Ganesh Kumar, 2013. Security in cloud for multi-owner using anonymous ID. Int. J. Emerg. Technol. Res., 1(1).
  21. Preeti, G. and S. Vineet, 2014. An efficient and secure data storage in mobile cloud computing through RSA and hash function. Proceeding of the International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). Ghaziabad, pp: 334-339.
  22. Rajathi, A. and N. Saravanan, 2013. A survey on secure storage in cloud computing. Indian J. Sci. Technol., 6(4): 4396-4401.
  23. Ramkumar, A. and R. Ashwin, 2014. Inter cloud data transfer security. Proceeding of the 4th International Conference on Communication Systems and Network Technologies.
  24. Sanjay, P., S. Rajeev and T. Udai-Bhan, 2014. Cloud-computing challenges, security and solutions: Using SaaS. Int. J. Innov. Adv. Comput. Sci., 3(5): 1-10.
  25. Sathyendrasingh, S.R. and S. Niresh, 2012. A survey of various techniques to secure cloud storage. Int. J. Comput. Sci. Netw. Secur., 12(3).
  26. Schwarz, T.J.E. and E.L. Miller, 2006. Store, forget, and check: Using algebraic signatures to check remotely administered storage. Proceeding of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS, 2006), pp: 12.
  27. Sebe, F., J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte and J.J. Quisquater, 2008. Efficient remote data possession checking in critical information infrastructures. IEEE T. Knowl. Data En., 20(8): 1034-1038.
    CrossRef    
  28. Shah, M.A., M. Baker, J.C. Mogul and R. Swaminathan, 2007. Auditing to keep online storage services honest. In: Hunt, G.C. (Ed.), Proceeding of the 11th USENIX Workshop Hot Topics in Operating Systems (HOTOS).
  29. Shikha, C., 2014. Comparative study on authentication schemes for cloud computing. Int. J. Eng. Dev. Res., 2(2).
  30. Ugale Santosh, A., 2014. Survey paper on integrity auditing of storage. Int. J. Comput. Eng. Res., 4(3).
  31. Vijay, G.R. and A.R. Mohan Reddy, 2014. Investigational analysis of security measures effectiveness in cloud computing: A study. Comput. Eng. Intell. Syst., 5(7).
  32. Visu, P., J. Janet, E. Kannan and S. Koteeswaran, 2012b. Optimal energy management in wireless adhoc network using Artificial Bee Colony based routing protocol. Eur. J. Sci. Res., 74(2): 301-307.
  33. Visu, P., S. Koteeswaran and J. Janet, 2012a. Artificial bee colony based energy aware and energy efficient routing protocol. J. Comput. Sci., 8(2): 227-231.
    CrossRef    
  34. Wang, C., Q. Wang, K. Ren and W. Lou, 2010. Privacy-preserving public auditing for data storage security in cloud computing. Proceeding of the IEEE INFOCOM, 2010. San Diego, CA, pp: 1-9.
    CrossRef    
  35. Wang, Q., C. Wang, K. Ren, W. Lou and J. Li, 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE T. Parall. Distr., 22(5): 847-859.
    CrossRef    
  36. XiaoChun, Y., L. ZengGuang and L. Hoon Jae, 2014. An efficient and secured data storage scheme in cloud computing using ECC-based PKI. Proceeding of the 16th International Conference on Advanced Communication Technology (ICACT, 2014). Pyeongchang, pp: 523-527.
  37. Yamamoto, G., S. Oda and K. Aoki, 2007. Fast integrity for large data. Proceeding of the ECRYPT Workshop on Software Performance Enhancement for Encryption and Decryption. Amsterdam, The Netherlands, pp: 21-32.
  38. Zhu, Y., H. Hu, G. Ahn and M. Yu, 2011b. Cooperative provable data possession for integrity verification in multicloud storage. IEEE T. Parall. Distr., 23(12): 2231-2244.
    CrossRef    
  39. Zhu, Y., H. Wang, Z. Hu, G.J. Ahn, H. Hu and S.S. Yau, 2011a. Dynamic audit services for integrity verification of outsourced storages in clouds. Proceeding of the ACM Symposium on Applied Computing (SAC'11), pp: 1550-1557.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved