[IJCST-V5I4P4]: Purnima,Deepak Kumar Verma

* The preview only display some random pages of manuals. You can download full content via the form below.

The preview is being generated... Please wait a moment!
  • Submitted by: EighthSenseGroup
  • File size: 891.8 KB
  • File type: application/pdf
  • Words: 2,689
  • Pages: 6
Report / DMCA this file Add to bookmark

Description

International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 4, Jul – Aug 2017 RESEARCH ARTICLE

OPEN ACCESS

A Survey on Data Integrity Auditing Schemes in Cloud Computing Purnima [1], Deepak Kumar Verma [2] Student of MTech. [1] Computer Science Department [2] IEC College of Engineering and Technology, Greater Noida Uttar Pradesh, India.

ABSTRACT Cloud computing is an inclusive new approach on how computing services are produced and utilized. Cloud computing is an accomplishment of various types of services which has attracted many users in today’s scenario. The most attractive service of cloud computing is Data outsourcing, due to this the data owners can host any size of data on the cloud server and users can access the data from cloud server when required. The new prototype of data outsourcing also faces the new security challenges. However, users may not fully trust the cloud service providers (CSPs) because sometimes they might be dishonest. It is difficult to determine whether the CSPs meet the customer’s expectations for data security. Therefore, to successfully maintain the integrity of cloud data, many auditing schemes have been proposed. Some existing integrity methods can only serve for statically archived data and some auditing techniques can be used for the dynamically updated data. In this paper, we have analyzed various existing data integrity auditing schemes along with their consequences. Keywords :— Third Party Auditor (TPA), Cloud Service Providers (CSPs), Data Outsourcing, Proof of Retrievability (POR), Provable data Possession (PDP).

I.

INTRODUCTION

Cloud computing is widely embraced by many organization and individuals because of its various dazzle advantages like huge size data storage, cumbersome computation, low price service and flexible way to access the data [1], [14]. The basic concept behind cloud computing is virtualization. In cloud computing, virtualization means to create a virtual variation of a device or resource, such as a server, storage device, network or operating system where the structure divides the resource into required number of execution environments [32]. Cloud computing is a predominant service of cloud storage, which allows data owner to store their data from their local computing system to cloud. Many users store their data on cloud storage. However new protocol of data hosting service also introduces security issue [6]. Data owner would be worry that data could be lost in the cloud. Therefore, the biggest concern is how to determine whether a cloud storage system and service provider meet the customer expectations for data security [20]. Therefore, it is crucial and significant to amplify efficient auditing scheme to strengthen data ownersʹ faith in cloud storage. Various types of auditing models have been proposed, they can be categorized into two types Private auditing model and Public Auditing Model. Traditionally in Private auditing model data owner can verify the integrity of outsourced data based on the two-party storage auditing

ISSN: 2347-8578

protocol. In this technique data owner should have expertise. It increases the overhead of data owner and sometimes it also happens both data owner and CSP cannot convince each other for the result.

Figure 1. Cloud Auditing Model.

As public auditing is the advisable model for outsourced data verification, it additionally involves the third party to check the integrity [3], [5], [14] which can provide equitable auditing result for both data owner and CSP. Data owner send metadata to TPA instead of original data. Basically, auditing model has two phases set up phase and verification

www.ijcstjournal.org

Page 17

International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 4, Jul – Aug 2017

phase. Data owner has to perform some operations prior to send data to TPA [5].

II. RELATED WORK In the contemporary year, cloud storage auditing has attracted attention to strengthen data owners' trust and confidence in cloud storage. To verify the integrity of outsourced data many protocols have been proposed with distinct techniques [4], [7], [8], [12], [15], [16], [18], [20], [21], [22], [26]. The first auditing related work was introduced in 2007 by Juels et al. is POR (Proof of Retrievability) [4] scheme, which can check the correctness of data with the use of error correcting code. It is typically a private auditing model because there is no existence of any other third party. In the same year, Atenies et al. [16] has introduced first public Auditing Model, PDP using Homomorphic tag based on RSA. It does not support privacy preserving of data. Beside data integrity auditing there are many other significant concerns such as privacypreserving, batch auditing, and dynamic auditing. In 2008, Atenies et al. [20] has further proposed the scheme which supports dynamic auditing but does not preserve privacy.

In 2009 Erway et al. [12] proposed dynamic PDP scheme that does not require privacy preserving. In 2010, First privacy preserving PDP was introduced by Wang et al. [6], they presented a public auditing scheme which ensures the privacy preserving for outsourced data using integrating Homomorphic authenticator with the random masking technique. In 2012 further, a new public auditing scheme Cooperative PDP (CPDP) technique proposed by Zhu et al [7], which was based on hash index hierarchy and Homomorphic verifiable scheme. It Supports public auditing, Privacy preserving and Batch auditing in the multi cloud but it has no provision for multi-user auditing. Dynamic Auditing Protocol (DAP)in 2013, Yang et al. [15] proposed further enhanced auditing schemes which supported dynamic auditing using the Index table scheme. In 2015, Identity-Based Distributed Provable Data Possession (ID-DPDP) scheme was proposed by Wang, Huaqun [26] which used bilinear pairing in random access model. Dynamic Hash Table-Public Audit (DHT-PA) introduced by Hui Tian et al. [14] in 2016 proposed Dynamic hash table which supported public dynamic auditing. Dynamic hash table supports public dynamic auditing and employed Homomorphic authenticator with random masking to preserve the privacy of outsourced data. They used aggregate BLS signature to arrange batch auditing.

III. LITERATURE SURVEY Data Integration Scheme

Technique

Proposed By

Year

Strength

Weakness

POR (Proof of Retrievability) [4]

Using error correcting code

Juels et al.

2007

 Private Auditing using error code  Data recovery is possible

 Increase overhead on Data Owner.  Cannot be used in the original form, preprocessing is required for encoding.

PDP (provable data possession) [16]

Use Homomorphic tag based on RSA

Atenies et al.

2007

 Support public auditing

   

Partially Dynamic – PDP [20]

ISSN: 2347-8578

Symmetric Key Cryptography

Atenies et al.

2008

 Supports Dynamic Auditing

www.ijcstjournal.org

 

Not Privacy preserving No Batch auditing Communication overhead Data recovery is not supported No Privacy preserving Bounded no of

Page 18

International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 4, Jul – Aug 2017

CPR (Compact Proof of Retrievability) [21]

HLA Built from secure BLSSignature

H. Shacham, B. Waters

2008

 Improved POR scheme



DPDP

Using ranked based authenticated skip list

Erway et al.

2009

 Dynamic data auditing  No demand of privacypreserving

 

Integrating the Homomorphic authenticator with random masking

Wang et al.

Fully Dynamic PDP [22]

Combined BLS based HLA with MHT

Wang et al.

2011

CPDP (corporative provable possession) [8]

Hash Index Hierarchy

Zhu et al.

2012

DAP [15]

Index table

Kan Yang et al.

(Dynamic PDP) [12]

PDP First privacy preserving [7]

 2010







Supports Dynamic Auditing





Support public auditing Privacy preserving Batch auditing in multi cloud

 It does not support dynamic audit  Does not support auditing for multiuser

Support public auditing Privacy preserving Support dynamic auditing Batch auditing in multi-cloud



High Computation cost

Support public auditing Privacy preserving Support dynamic auditing Batch auditing in multi-cloud



Heavy computation cost of the TPA Large communication overhead

 Support public auditing  Privacy preserving  Support dynamic auditing



 

   

DPDP-MHT [19]

Based on Merkle hash tree

Wang et al.

2013

   

IHT-PA (Index hash table-public audit) [18]

ISSN: 2347-8578

Index Hash table

Zhu et al.

2013

No public auditing Not support Batch auditing Not Privacy preserving Does not support data dynamics

Supports public auditing Privacy preserving



2013

Audits. No Privacy preserving

www.ijcstjournal.org



Not Privacy preserving

Batch auditing is not mentioned

Page 19

International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 4, Jul – Aug 2017

MUR-DPA [2]

Used Authenticated Data Structure (ADS) based on the Merkle Hash Tree (MHT)

Liu, Chang, et al.

2014

 Provides facility to verify cloud data storage with multiple replicas.



Works only with constant-sized integrity proofs

ID-DPDP [26]

Distributed Provable Data Possession in Multi-cloud storage.

Wang, Huaqun

2015

 Bilinear pairings in random oracle model Flexible and improves the efficiency.



Verification delay occurs

DHT-PA (Dynamic hash table-public audit) [14]

Dynamic Hash table

Hui Tian et al.

2016

 Support public auditing  Privacy preserving  Support dynamic auditing  Batch auditing in multi cloud



Communication cost is greater than DAP and IHT-PA

Table 1: Comparison of existing data integrity auditing schemes [5]

IV. CONCLUSION In cloud computing, a new paradigm of data outsourcing

increases new security challenges. This new paradigm requires a Third-Party Auditor to check the data integrity in cloud storage. In this paper, we have compared different types of auditing schemes on the basis of Privacy preservation, dynamic auditing and batch auditing along with their strength and weakness. From all these papers, it is concluded that there is need to design some optimizing techniques that can be applied to speed up the set phase at data owner side [2], [20], [32]. In our previous paper, we have proposed a multithreading model on multi-core CPU system to generate the signature for each block [5], it is onetime operation and occurs in setup phase at data owner side.

V.

FUTURE WORK

In future, we will focus on enhanced & sophisticated data setup process to reduce the computation and communication overhead at data owner side. To generate authenticator, we use multithreading framework on latest multi-core system to speed up the setup phase. We will use the multithreading model in each step of data setup phase.

REFERENCES

ISSN: 2347-8578

[1] P. Melland, T. Grance, “The NIST Definition of Cloud Computing, technical report”, Nat’l Inst. of Standards and Technology, 2009. [2] Nandini J., Sugapriya N. P., M. S. Vinmathi, “Secure Multi-Owner Data Storage with Enhanced TPA Auditing Scheme in Cloud Computing”, International Journal of Advances in Computer Science and Cloud Computing, ISSN: 2321-4058, Vol. 2, Issue: 1, MAY 2014. [3] C. Wang, S. M. Chow, Q. Wang, K. Ren and W. Lou, ʺPrivacy‐Preserving Public Auditing for Secure Cloud Storage, ʺ vol. 62, IEEE Trans. on Computers, no. 2, pp. 362‐375, 2013. [4] A. Juels and B.S. Kaliski Jr., “PoRs: Proofs of Retrievability for Large Files,” Proc. ACM Conf. Computer and Communications Security (CCS ’07), pp. 584‐597, 2007. [5] Deepak Kumar Verma, Purnima and Rajesh Kumar Tyagi, “Optimizing the User Side Set-up Phase for Privacy Preserving Public Auditing in Cloud Storage”, (manuscript submitted for publication), 2017. [6] K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, vol. 24, IEEE Trans. on Parallel and

www.ijcstjournal.org

Page 20

International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 4, Jul – Aug 2017

Distributed Systems, no. 9, pp.1717‐1726, ISSN: 2278 – 1323, 2013. [7] C. Wang, Q. Wang, K. Ren and W. Lou, “Privacy‐Preserving Public Auditing for Data Storage Security in Cloud Computing”, Proc. IEEE INFOCOM, pp. 1‐9, 2010. [8] Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable Data Possession for Integrity Verification in Multi‐Cloud Storage”, vol. 23, IEEE Trans. Parallel and Distributed Systems, no. 12, pp. 2231‐2244, 2012. [9] J. Ryoo, S. Rizvi, W. Aiken and J. Kissell, ʺCloud Security Auditing: Challenges and Emerging Approachesʺ, IEEE Security & Privacy, vol. 12, no. 6, pp. 68‐74, 2014. [10] M. S. Giri, B. Gaur, D. Tomar, “A Survey on Data Integrity Techniques in Cloud Computing”, Vol. 122, No. 2, International Journal of Computer Applications (0975 – 8887), July 2015.

[11] K. Shinde, V. V. Jog, “A Survey on Integrity Checking for Outsourced Data in Cloud using TPA”, International Journal of Computer Applications (0975 – 8887), International Conference on Internet of Things, Next Generation Networks and Cloud Computing, 2016. [12] C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession”, proc. ACM Conf. Computer and Comm. Security (CCS’09), pp.213-222, 2009. [13] Sumalatha M.R., Hemalathaa S., Monika R., Ahila C., “Towards Secure Audit Services for Outsourced Data in Cloud”, International Conference on Recent Trends in Information Technology IEEE, 2014. [14] H. Tian, Y. Chen, C. Chang, “Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, Vol. PP, Issue: 99, IEEE Transactions on Service Computing, Manuscript ID, DEC 2016.

[15] CH. Mutyalanna, P. Srinivasulu, M. Kiran, “Dynamic Audit Service Outsourcing for Data Integrity in Clouds”, Vol. 2 Issue 8, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), AUG 2013.

. [21] H. Shacham and B. Waters, “Compact Proofs of Retrievability”, vol. 5350, Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (Asiacrypt), pp. 90-107, DEC 2008.

[16] G. Ateniese, R. B. Johns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, ‘‘Provable Data Possession at Untrusted Stores,’’ Proc. 14th ACM Conf. on Comput. and Commun. Security (CCS), pp. 598‐609, 2007.

[22] Syed Rizvi, Katie and Abdul, “Cloud Data Integrity Using a Designated Public Verifier,” in 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC), International Symposium on Cyberspace Safety and Security (CSS) and International Conference on Embedded Software and System (ICESS).

[17] Mr. Pragnash G. Patel and Sanjay M. Shah, “Survey on data security in cloud computing”, Vol 1, Issue 9, International Journal of Engg Research and Tech (IJERT), ISSN: 2278-0181, NOV 2012. [18] Zhu, H. Wang, Z. Hu, G. J. Ahn, H. Hu and S. S.Yau, “Dynamic Audit Services for Outsourced Storage in Clouds”, Vol. 6, no. 2, IEEE Trans. on Services Computing, pp. 227–238, 2013. [19] Q. Wang, C. Wang, K. Ren, W. Lou and J. Li, ‘‘Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing’’, Vol. 22, no. 5, IEEE Trans. on Parallel and Distributed Systems, pp. 847‐859, 2011. [20] A P Shirahatti, P S Khanagoudar, “Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing”, IMACST, Vol. 3, Number 3, JUN 2012.

ISSN: 2347-8578

[23] S Lins, S Schneider, and A Sunyaev, “Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing”, Vol. PP, Issue: 99 IEEE Transactions on Cloud Computing, TCC-2015-10-0378, JAN 2016. [24] A Kushanpalli, V. S. Kumar, C. R. Yadav, “A Simulation Study of Outsourcing of Audit Service for Data Integrity in Cloud Computing”, Vol. 3, Issue 11, ISSN (Print): 2319-5940, International Journal of Advanced Research in Computer and Communication Engineering, NOV 2014. [25] D. N. Rewadkar, S. Y. Ghatage, “Cloud Storage System Enabling Secure Privacy Preserving Third Party Audit”, International Conference on Control, Instrumentation,

www.ijcstjournal.org

Page 21

International Journal of Computer Science Trends and Technology (IJCST) – Volume 5 Issue 4, Jul – Aug 2017

Communication and Computational (ICCICCT), JUL 2014.

Technologies

[26] Wang, Huaqun. "Identity-Based Distributed Provable Data Possession in Multicloud Storage", Services Computing, IEEE Transactions on 8.2 (2015): 328-340. [27] S. Pearson, "Toward Accountability in the Cloud", Vol. 15, no. 4, IEEE Internet Computing, pp. 64–69, 2011. [28] Cloud Security Alliance,”Top Threats to Cloud Computing”, http://www.cloudsecurityalliance.org, 2010. [29] C. Wang, K. Ren, W. Lou, and J. Li, “Towards Publicly Auditable Secure Cloud Data Storage Services”, Vol. 24, no. 4, IEEE Network Magazine, pp. 19-24, July/Aug. 2010.

ISSN: 2347-8578

[30] S. N. Poornima, R. S. Ponmagal, “Secure Preserving Public Auditing for Regenerating Code Based On Cloud Storage”, International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353, Vol. 21, Issue: 4, APR 2016. .[31] K. Chen, J. M. Chang, T. Hou, “Multithreading in Java: Performance and Scalability on Multicore Systems”, Vol. 60, IEEE Transactions on Computers, NO. 11, NOV 2011. [32] N. Saravana Kumar, G.V. Rajya Lakshmi, B Balamurugan,” Enhanced Attribute Based Encryption for Cloud Computing”, Vol. 46, pp 689-696, 2015.

www.ijcstjournal.org

Page 22