Skip to main content
Log in

Cloud auditing and authentication scheme for establishing privacy preservation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data duplication. But the unique copy of the original data is stored in the cloud server, and it causes data loss in terms of corruption or missing. It is essential to maintain the duplicate copy of the file and integrity auditing in the field of academic and industrial. The file over the cloud is maintained in a secure or protected manner. This paper proposes cloud auditing with secure file maintenance to retain the duplicate copy of the encrypted file. During the process of public auditing, integrity is maintained for each copy with reduced storage. Secure Authentication with User Anonymity (SAUS) is established with cloud auditing and confidentiality during the process of duplication, and auditing integrity is maintained with encryption approaches. The duplication process is invoked with Multi-Failure Resilient Replication (MRR) procedure in which the data loss is reduced. In order to deal with the multiple auditing strategy for outsourced data, data integrity is maintained with each data owner and delegating third party auditing (TPA) independently. The proposed work is implemented in MATLAB environment with better security and improved performance. The performance of the proposed work is compared with the existing approaches, which shows a better trade-off in contrast to prevailing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article.

References

  1. Walker I, Hewage C, Jayal A (2022) Provable data possession (pdp) and proofs of retrievability (por) of current big user data. SN Comput Sci Springer 3(1):1–9

    Google Scholar 

  2. Armknecht F, Bohli J-M, Karame G, Li W (2018) Outsourcing proofs of retrievability. IEEE Trans Cloud Comput 9(1):286–301

    Article  Google Scholar 

  3. Chen R, Li Y, Yu Y, Li H, Chen X, Susilo W (2020) Blockchain-based dynamic provable data possession for smart cities. IEEE Int Things J 7(5):4143–4154

    Article  Google Scholar 

  4. Xu Y, Zhang C, Wang G, Qin Z, Zeng Q (2020) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Top Comput 9(3):1421–1432

    Article  Google Scholar 

  5. Zhou Y, Feng D, Hua Y, Xia W, Fu M, Huang F, Zhang Y (2018) A similarity-aware encrypted de-duplication scheme with flexible access control in the cloud. Future Gener Comput Syst Elsevier 84:177–189

    Article  Google Scholar 

  6. Liu X (2017) Publicly verifiable inner product evaluation over outsourced data streams under multiple keys. IEEE Trans Serv Comput 10(5):826–838

    Article  Google Scholar 

  7. Li J (2017) Secure auditing and de-duplicating data in cloud. IEEE Trans Comput 65(8):2386–2396

    Article  Google Scholar 

  8. Youn TY (2017) Public audit and secure de-duplication in cloud storage using BLS signature. Res Briefs Inf Commun Technol Evol (ReBICTE) 3(14):1–10

    Google Scholar 

  9. Hou H, Yu J, Hao R (2019) Cloud storage auditing with de-duplication supporting different security levels according to data popularity. J Network Comput Appl Elsevier 134:26–39

    Article  Google Scholar 

  10. Hiremath S, Kunte RS (2020) Homomorphic authentication scheme for proof of retrievability with public verifiability. In: 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE 1017–1022

  11. Tian H (2017) Enabling public auditability for operation behaviors in cloud storage. Soft Comput Springer 21(8):2175–2187

    Article  Google Scholar 

  12. Young M, Rodriguez L, Keller E, Sun F, Sa B, Whittington J, Howe B (2019) Beyond open vs. closed: Balancing individual privacy and public accountability in data sharing. In: Proceedings of the Conference on Fairness, Accountability, and Transparency, 191–200

  13. Yang Z, Wang W and Huang Y (2017) Ensuring reliable logging for data accountability in untrusted cloud storage. In: 2017 IEEE International Conference on Communications (ICC) 1–6

  14. Tian H (2015) Dynamic hash- table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10(5):701–714

    Article  Google Scholar 

  15. Taneja H, Kaur S (2022) Fake feedback detection to enhance trust in cloud using supervised machine learning techniques. In: Proceedings of data analytics and management, Springer, Singapore, 789–796

  16. Li J, Yan H, Zhang Y (2020) Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst J 15(1):577–585

    Article  Google Scholar 

  17. Cheng H, Rong C, Qian M, Wang W (2018) Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption. IEEE Access 6:37869–37882

    Article  Google Scholar 

  18. Kundalwal MK, Chatterjee K, Singh A (2019) An improved privacy preservation technique in health-cloud. ICT Express Elsevier 5(3):167–172

  19. Xue K, Hong J, Ma Y, Wei SLD, Hong P, Yu N (2018) Fog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing. IEEE Network 32(3):7–13

    Article  Google Scholar 

  20. Fan Y, Lin X, Liang W, Tan G, Nanda P (2019) A secure privacy preserving de-duplication scheme for cloud computing. Future Gener Comput Syst Elsevier 101:127–135

    Article  Google Scholar 

  21. Qiu M, Gai K, Zhao H, Liu M (2018) Privacy-preserving smart data storage for financial industry in cloud computing. Concurr Comput: Pract Experience, Wiley Online Library 30(5):e4278

    Article  Google Scholar 

  22. Polu SK (2018) Security Enhancement for data objects in cloud computing. Int J Innov Res Sci Technol Researchgate.net, 5(6):18–21

  23. Liu J, Shen H, Chi H, Narman HS, Yang Y, Cheng L, Chung W (2020) A low-cost multi-failure resilient replication scheme for high-data availability in cloud storage. IEEE/ACM Trans Networking 29(4):1436–1451

    Article  Google Scholar 

  24. Tchernykh A, Schwiegelsohn U, E-g T, Babenko M (2019) Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. J Comput Sci Elsevier 36:100581

    Article  Google Scholar 

  25. Garg N, Bawa S, Kumar N (2020) An efficient data integrity auditing protocol for cloud computing. Future Gener Comput Syst Elsevier 109:306–316

    Article  Google Scholar 

  26. Huang P, Fan K, Yang H, Zhang K, Li H, Yang Y (2020) A collaborative auditing blockchain for trustworthy data integrity in cloud storage system. IEEE Access 8:94780–94794

    Article  Google Scholar 

  27. Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N, Varatharajan R, Hsu C-H (2019) An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications”. Sustain Cities Soc Elsevier 49:101522

    Article  Google Scholar 

  28. Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Gener Comput Syst Elsevier 91:475–492

    Article  Google Scholar 

  29. Prabha KM, Saraswathi PV (2020) Suppressed K-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing. Comput Commun Elsevier 158:85–94

    Article  Google Scholar 

  30. Miao M, Tian G, Susilo W (2021) New proofs of ownership for efficient data de-duplication in the adversarial conspiracy model. Int J Intell Syst Wiley online Library 36(6):2753–2766

    Article  Google Scholar 

  31. Wang F, Xu L, Choo KKR, Zhang Y, Wang H and Li J (2019) Lightweight certificate-based public/private auditing scheme based on bilinear pairing for cloud storage. IEEE Access 8:2258–2271

  32. Li X, Liu S and Lu R (2020) Comments on a public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Info Forensics Sec 15:2881–2883

  33. Sahinidis NV (2019) Mixed-integer non-linear programming 2018. Optim Eng Springer 20(2):301–306

    Article  Google Scholar 

  34. Thokchom S, Saikia DK (2020) Privacy preserving integrity checking of shared dynamic cloud data with user revocation. J Inf Secur Appl Elsevier 50:102427

    Google Scholar 

  35. Devika KN and Bhakthavatchalu R (2019) Parameterizable FPGA implementation of SHA-256 using blockchain concept. In: 2019 International conference on communication and signal processing (ICCSP). IEEE 0370–0374

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions to this work.

Corresponding author

Correspondence to Rajesh Bingu.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to participate

All authors have agreed to participate in this submitted article.

Consent to publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Conflict of interest

Authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bingu, R., Jothilakshmi, S. Cloud auditing and authentication scheme for establishing privacy preservation. Multimed Tools Appl 83, 43849–43870 (2024). https://doi.org/10.1007/s11042-023-17170-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17170-3

Keywords

Navigation