CSI Transactions on ICT

, Volume 5, Issue 4, pp 407–418 | Cite as

A curious collaborative approach for data integrity verification in cloud computing

S.I. : Cloud Computing for Scientific and Business Needs
  • 43 Downloads

Abstract

Data integrity verification with high security and minimal overhead is a primary prerequisite for expansion of luminous generation and perception of cloud computing. In present revolution, all the precise data and applications have conveyed towards cloud infrastructure and data center, which run on virtual computing resources in the form of virtual machine. The large scale use of virtualization brings additional security overhead for tenants of a public cloud service. In this paper, we suggested a better and efficient data integrity verification technique that help users to utilize data as a service in cloud computing. The building blocks of our technique are algebraic signature, homomorphic tag, and combinatorial batch codes. Homomorphic tags are assigned a particular verifiable value to each data blocks, which can help us for unleashed data operations on this blocks. The property of algebraic signature is used to aggregate data blocks for file operations. Combinatorial batch codes are used to assign and store integrated data into different distributed cloud server. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are demonstrating the effectiveness of the proposed method for data integrity verification.

Keywords

Proof of retrievability (PoR) Provable data possession (PDP) Third party auditing Algebraic signature Homomorphic tag and combinatorial batch codes (CBC) 

Notes

Acknowledgements

The authors would like to thank the anonymous reviewers and our colleagues for their suggestions to improve the manuscript.

References

  1. 1.
    Saxena R, Ruj S, Sarma M (2013) Collaborative model for privacy preservation and data integrity verification in cloud computing. In: Proceedings of the security and privacy symposium, IIT Kanpur, Kanpur, IndiaGoogle Scholar
  2. 2.
    Ruj S, Saxena R (2015) Securing cloud data. In: Cloud computing with e-science applications. CRC Press, Boca Raton, pp 41–72, ISBN:978-1-4665-9115-8Google Scholar
  3. 3.
    Saxena R, Dey S (2016) Cloud audit: a data integrity verification approach for cloud computing. Proc Comput Sci 89:142–151. doi:10.1016/j.procs.2016.06.024 ISSN 1877-0509CrossRefGoogle Scholar
  4. 4.
    Saxena R, Dey S (2014) Collaborative approach for data integrity verification in cloud computing. In: Perez GM, Thampi SM, Ko RKL, Shu L (eds) SNDS, ser. communications in computer and information science. Springer, Berlin, pp 1–15Google Scholar
  5. 5.
    Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of 14th ACM conference computer and communication security, pp 598–609, ACMGoogle Scholar
  6. 6.
    Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. ACM SecureComGoogle Scholar
  7. 7.
    Sebe F, Domingo-Ferrer J, Martinez-Balleste A, Deswarte Y, Quisquater JJ (2008) Efficient remote data possession checking in critical information infrastructures. IEEE Trans Knowl Data Eng 20(8):1034–1038CrossRefGoogle Scholar
  8. 8.
    Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference computer and communication security (CCS ’09), pp 213–222Google Scholar
  9. 9.
    Chen L (2012) Using algebraic signatures to check data possession in cloud storage. In: Future generation computer systems. ElsevierGoogle Scholar
  10. 10.
    Juels A, Kaliski BS (2007) PORs: proofs of retrievability for large files. In: ACM conference on computer and communications securityGoogle Scholar
  11. 11.
    Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of 14th international conference on theory and application of cryptology and information security: advances in cryptologyGoogle Scholar
  12. 12.
    Dodis Y, Vadhan SP, Wichs D (2009) Proofs of retrievability via hardness amplification. ACM TCC-2009, pp 109–127Google Scholar
  13. 13.
    Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: theory and implementation. In: ACM workshop on cloud computing security, pp 43–45Google Scholar
  14. 14.
    Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM conference on computer and communications security, pp 187–198Google Scholar
  15. 15.
    Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM, IEEEGoogle Scholar
  16. 16.
    Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRefGoogle Scholar
  17. 17.
    Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437CrossRefGoogle Scholar
  18. 18.
    Zhu Y, Wang H, Hu Z, Ahn G-J, Hu H, Yau SS (2012) Cooperative provable data possession. In: Cryptology ePrint archive, report 2012(234), pp 257–265Google Scholar
  19. 19.
    Litwin W, Schwarz TJE (2004) Algebraic signatures for scalable, distributed data structures. In: ICDE04, Boston, MA, pp 412–423Google Scholar
  20. 20.
    Schwarz TJE, Miller EL (2006) Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceedings of ICDCS06, p 12Google Scholar
  21. 21.
    Stinson D, Wei R, Paterson MB (2009) Combinatorial batch codes. Adv Math Commun 3(1):13–27CrossRefMATHMathSciNetGoogle Scholar
  22. 22.
    Brualdi RA, Kiernan KP, Meyer SA, Schroeder MW (2010) Combinatorial batch codes and transversal matroids. Adv Math Commun 4(3):419–431CrossRefMATHMathSciNetGoogle Scholar
  23. 23.
    Bujtas C, Tuza Z (2011) Optimal combinatorial batch codes derived from dual systems. Miskolc Math Notes 12(1):11–23MATHMathSciNetGoogle Scholar
  24. 24.
    Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A (2004) Batch codes and their applications. In: Proceedings of the thirty-sixth annual ACM symposium on theory of computing. ACM, pp 262–271Google Scholar
  25. 25.
  26. 26.
    Cloudera Downloads Get Started With Hadoop (2014) http://www.cloudera.com/content/cloudera/en/downloads.html

Copyright information

© CSI Publications 2017

Authors and Affiliations

  1. 1.Cloud Computing Lab, School of Computer Science and EngineeringIndian Institute of Technology IndoreIndoreIndia

Personalised recommendations