Abstract
Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data duplication. But the unique copy of the original data is stored in the cloud server, and it causes data loss in terms of corruption or missing. It is essential to maintain the duplicate copy of the file and integrity auditing in the field of academic and industrial. The file over the cloud is maintained in a secure or protected manner. This paper proposes cloud auditing with secure file maintenance to retain the duplicate copy of the encrypted file. During the process of public auditing, integrity is maintained for each copy with reduced storage. Secure Authentication with User Anonymity (SAUS) is established with cloud auditing and confidentiality during the process of duplication, and auditing integrity is maintained with encryption approaches. The duplication process is invoked with Multi-Failure Resilient Replication (MRR) procedure in which the data loss is reduced. In order to deal with the multiple auditing strategy for outsourced data, data integrity is maintained with each data owner and delegating third party auditing (TPA) independently. The proposed work is implemented in MATLAB environment with better security and improved performance. The performance of the proposed work is compared with the existing approaches, which shows a better trade-off in contrast to prevailing approaches.
Similar content being viewed by others
Data availability
Data sharing is not applicable to this article.
References
Walker I, Hewage C, Jayal A (2022) Provable data possession (pdp) and proofs of retrievability (por) of current big user data. SN Comput Sci Springer 3(1):1–9
Armknecht F, Bohli J-M, Karame G, Li W (2018) Outsourcing proofs of retrievability. IEEE Trans Cloud Comput 9(1):286–301
Chen R, Li Y, Yu Y, Li H, Chen X, Susilo W (2020) Blockchain-based dynamic provable data possession for smart cities. IEEE Int Things J 7(5):4143–4154
Xu Y, Zhang C, Wang G, Qin Z, Zeng Q (2020) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Top Comput 9(3):1421–1432
Zhou Y, Feng D, Hua Y, Xia W, Fu M, Huang F, Zhang Y (2018) A similarity-aware encrypted de-duplication scheme with flexible access control in the cloud. Future Gener Comput Syst Elsevier 84:177–189
Liu X (2017) Publicly verifiable inner product evaluation over outsourced data streams under multiple keys. IEEE Trans Serv Comput 10(5):826–838
Li J (2017) Secure auditing and de-duplicating data in cloud. IEEE Trans Comput 65(8):2386–2396
Youn TY (2017) Public audit and secure de-duplication in cloud storage using BLS signature. Res Briefs Inf Commun Technol Evol (ReBICTE) 3(14):1–10
Hou H, Yu J, Hao R (2019) Cloud storage auditing with de-duplication supporting different security levels according to data popularity. J Network Comput Appl Elsevier 134:26–39
Hiremath S, Kunte RS (2020) Homomorphic authentication scheme for proof of retrievability with public verifiability. In: 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE 1017–1022
Tian H (2017) Enabling public auditability for operation behaviors in cloud storage. Soft Comput Springer 21(8):2175–2187
Young M, Rodriguez L, Keller E, Sun F, Sa B, Whittington J, Howe B (2019) Beyond open vs. closed: Balancing individual privacy and public accountability in data sharing. In: Proceedings of the Conference on Fairness, Accountability, and Transparency, 191–200
Yang Z, Wang W and Huang Y (2017) Ensuring reliable logging for data accountability in untrusted cloud storage. In: 2017 IEEE International Conference on Communications (ICC) 1–6
Tian H (2015) Dynamic hash- table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10(5):701–714
Taneja H, Kaur S (2022) Fake feedback detection to enhance trust in cloud using supervised machine learning techniques. In: Proceedings of data analytics and management, Springer, Singapore, 789–796
Li J, Yan H, Zhang Y (2020) Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst J 15(1):577–585
Cheng H, Rong C, Qian M, Wang W (2018) Accountable privacy-preserving mechanism for cloud computing based on identity-based encryption. IEEE Access 6:37869–37882
Kundalwal MK, Chatterjee K, Singh A (2019) An improved privacy preservation technique in health-cloud. ICT Express Elsevier 5(3):167–172
Xue K, Hong J, Ma Y, Wei SLD, Hong P, Yu N (2018) Fog-aided verifiable privacy preserving access control for latency-sensitive data sharing in vehicular cloud computing. IEEE Network 32(3):7–13
Fan Y, Lin X, Liang W, Tan G, Nanda P (2019) A secure privacy preserving de-duplication scheme for cloud computing. Future Gener Comput Syst Elsevier 101:127–135
Qiu M, Gai K, Zhao H, Liu M (2018) Privacy-preserving smart data storage for financial industry in cloud computing. Concurr Comput: Pract Experience, Wiley Online Library 30(5):e4278
Polu SK (2018) Security Enhancement for data objects in cloud computing. Int J Innov Res Sci Technol Researchgate.net, 5(6):18–21
Liu J, Shen H, Chi H, Narman HS, Yang Y, Cheng L, Chung W (2020) A low-cost multi-failure resilient replication scheme for high-data availability in cloud storage. IEEE/ACM Trans Networking 29(4):1436–1451
Tchernykh A, Schwiegelsohn U, E-g T, Babenko M (2019) Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. J Comput Sci Elsevier 36:100581
Garg N, Bawa S, Kumar N (2020) An efficient data integrity auditing protocol for cloud computing. Future Gener Comput Syst Elsevier 109:306–316
Huang P, Fan K, Yang H, Zhang K, Li H, Yang Y (2020) A collaborative auditing blockchain for trustworthy data integrity in cloud storage system. IEEE Access 8:94780–94794
Jegadeesan S, Azees M, Kumar PM, Manogaran G, Chilamkurti N, Varatharajan R, Hsu C-H (2019) An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications”. Sustain Cities Soc Elsevier 49:101522
Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Future Gener Comput Syst Elsevier 91:475–492
Prabha KM, Saraswathi PV (2020) Suppressed K-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing. Comput Commun Elsevier 158:85–94
Miao M, Tian G, Susilo W (2021) New proofs of ownership for efficient data de-duplication in the adversarial conspiracy model. Int J Intell Syst Wiley online Library 36(6):2753–2766
Wang F, Xu L, Choo KKR, Zhang Y, Wang H and Li J (2019) Lightweight certificate-based public/private auditing scheme based on bilinear pairing for cloud storage. IEEE Access 8:2258–2271
Li X, Liu S and Lu R (2020) Comments on a public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Info Forensics Sec 15:2881–2883
Sahinidis NV (2019) Mixed-integer non-linear programming 2018. Optim Eng Springer 20(2):301–306
Thokchom S, Saikia DK (2020) Privacy preserving integrity checking of shared dynamic cloud data with user revocation. J Inf Secur Appl Elsevier 50:102427
Devika KN and Bhakthavatchalu R (2019) Parameterizable FPGA implementation of SHA-256 using blockchain concept. In: 2019 International conference on communication and signal processing (ICCSP). IEEE 0370–0374
Author information
Authors and Affiliations
Contributions
All authors have equal contributions to this work.
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent to participate
All authors have agreed to participate in this submitted article.
Consent to publish
All the authors involved in this manuscript give full consent for publication of this submitted article.
Conflict of interest
Authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bingu, R., Jothilakshmi, S. Cloud auditing and authentication scheme for establishing privacy preservation. Multimed Tools Appl 83, 43849–43870 (2024). https://doi.org/10.1007/s11042-023-17170-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17170-3