Advertisement

Automated Software Engineering

, Volume 21, Issue 3, pp 373–390 | Cite as

Data error locations reported by public auditing in cloud storage service

  • Min-Shiang Hwang
  • Cheng-Chi LeeEmail author
  • Tsuei-Hung Sun
Article

Abstract

Public auditing is an important issue in cloud storage service because a cloud service provider may try to hide management mistakes and system errors from users or even steal or tamper with a user’s data for monetary reasons. Without the protection of a proper auditing mechanism, cloud users would have to run high risks of having their legal rights and interests spoiled without their knowledge. Therefore, many data integrity, assurance, and correctness schemes have been proposed for data auditing. Most of these schemes work by randomly sampling and aggregating signatures from bilinear maps (for more efficiency) to check whether the cloud storage service is honest and whether the data stored in the cloud is correct. Although aggregating signatures can reduce the auditor’s computing overhead and time, unfortunately, none of these schemes have offered any workable solution to giving detailed information on where the errors are when the cloud data as a whole fails the auditing. To fix this problem, we shall propose a new public auditing scheme with a mechanism integrated into it especially to locate the problematic data blocks when they exist. With efficiency, the proposed scheme is capable not only of giving an accurate pass/fail report but also providing detailed information on the locations of the errors detected.

Keywords

Cloud storage service Public auditing Data confidentiality  Error located Security 

Notes

Acknowledgments

The authors would like to express their appreciation to the anonymous referees for their valuable suggestions and comments. This research was partially supported by the National Science Council, Taiwan, ROC, under Contract No. NSC102-2221-E-030-003.

References

  1. Ateniese, G., Kevin, F.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRefzbMATHGoogle Scholar
  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, pp. 598–610, October (2007)Google Scholar
  3. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, pp. 514–532, December (2001)Google Scholar
  4. Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms’. Int. J. Netw. Secur. 10(3), 216–222 (2010)Google Scholar
  5. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect. Notes Comput. Sci. 3156, 119–132 (2004)CrossRefGoogle Scholar
  6. Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15(4), 231–240 (2013)Google Scholar
  7. Li, C.-T., Hwang, M.-S.: A batch verifying and detecting the illegal signatures. Int. J. Innov. Comput. Inf. Control 6(12), 5311–5320 (2010)Google Scholar
  8. Liu, Q., Wang, G., Wu, J.: Efficient sharing of secure cloud storage services. In: Proceeding of the 10th IEEE International Conference on Computer and Information Technology (CIT 2010), Bradford, USA, pp. 922–929, June (2010)Google Scholar
  9. Liu, H., Zhang, P., Liu, J.: Public data integrity verification for secure cloud storage. J. Netw. 8(2), 373–380 (2013)Google Scholar
  10. Rajathi, A., Saravanan, N.: A survey on secure storage in cloud computing. Indian J. Sci. Technol. 6(4), 4396–4401 (2013)Google Scholar
  11. Rifa-Pous, H., Herrera-Joancomarti, J.: Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 3(1), 31–48 (2011)CrossRefGoogle Scholar
  12. Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: Proceeding of the 4th International Conference on Internet Multimedia Systems Architecture and Applications (IMSAA-10), Bangalore, India, pp. 1–6, December (2009)Google Scholar
  13. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security–ASIACRYPT 2008, Melbourne, Australia, p. 90V107, December (2008)Google Scholar
  14. Shucheng, Y., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data dccess control in cloud computing. In: Proceeding of the 29th IEEE INFOCOM 2010, San Diego, CA, pp. 1–9, March (2010)Google Scholar
  15. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)Google Scholar
  16. Sun, T.H.: A study of key management and data auditing in cloud storage service. Master’s Thesis of National Chung Hsing University, Taichung, Taiwan, pp. 1–65 (2012)Google Scholar
  17. Syam Kumar, P., Subramanian, R.: RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence. Int. J. Cloud Comput. 1(2), 167–200 (2012)Google Scholar
  18. Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors. Lect. Notes Comput. Sci. 4307, 519–528 (2006)CrossRefGoogle Scholar
  19. Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceeding of the 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, IL, pp. 735–737, October (2010a)Google Scholar
  20. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceeding of the 29th IEEE INFOCOM 2010, San Diego, CA, pp. 1–9 March (2010b)Google Scholar
  21. Wang, G., Liu, Q., Jie, W., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 311–320 (2011a)Google Scholar
  22. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 4(4), 1–14 (2011b)Google Scholar
  23. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011c)Google Scholar
  24. Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)CrossRefGoogle Scholar
  25. Zhu, Y., Hongxin, H.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5), 1083–1095 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Min-Shiang Hwang
    • 1
    • 2
  • Cheng-Chi Lee
    • 3
    Email author
  • Tsuei-Hung Sun
    • 4
  1. 1.Department of Computer Science and Information EngineeringAsia UniversityTaichungTaiwan, ROC
  2. 2.Department of Health Services AdministrationChina Medical UniversityTaichungTaiwan, ROC
  3. 3.Department of Library and Information ScienceFu Jen Catholic UniversityNew Taipei CityTaiwan, ROC
  4. 4.Department of Management Information SystemsNational Chung Hsing UniversityTaichungTaiwan, ROC

Personalised recommendations