Abstract
Data integrity verification with high security and minimal overhead is a primary prerequisite for expansion of luminous generation and perception of cloud computing. In present revolution, all the precise data and applications have conveyed towards cloud infrastructure and data center, which run on virtual computing resources in the form of virtual machine. The large scale use of virtualization brings additional security overhead for tenants of a public cloud service. In this paper, we suggested a better and efficient data integrity verification technique that help users to utilize data as a service in cloud computing. The building blocks of our technique are algebraic signature, homomorphic tag, and combinatorial batch codes. Homomorphic tags are assigned a particular verifiable value to each data blocks, which can help us for unleashed data operations on this blocks. The property of algebraic signature is used to aggregate data blocks for file operations. Combinatorial batch codes are used to assign and store integrated data into different distributed cloud server. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are demonstrating the effectiveness of the proposed method for data integrity verification.
Similar content being viewed by others
References
Saxena R, Ruj S, Sarma M (2013) Collaborative model for privacy preservation and data integrity verification in cloud computing. In: Proceedings of the security and privacy symposium, IIT Kanpur, Kanpur, India
Ruj S, Saxena R (2015) Securing cloud data. In: Cloud computing with e-science applications. CRC Press, Boca Raton, pp 41–72, ISBN:978-1-4665-9115-8
Saxena R, Dey S (2016) Cloud audit: a data integrity verification approach for cloud computing. Proc Comput Sci 89:142–151. doi:10.1016/j.procs.2016.06.024 ISSN 1877-0509
Saxena R, Dey S (2014) Collaborative approach for data integrity verification in cloud computing. In: Perez GM, Thampi SM, Ko RKL, Shu L (eds) SNDS, ser. communications in computer and information science. Springer, Berlin, pp 1–15
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of 14th ACM conference computer and communication security, pp 598–609, ACM
Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. ACM SecureCom
Sebe F, Domingo-Ferrer J, Martinez-Balleste A, Deswarte Y, Quisquater JJ (2008) Efficient remote data possession checking in critical information infrastructures. IEEE Trans Knowl Data Eng 20(8):1034–1038
Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference computer and communication security (CCS ’09), pp 213–222
Chen L (2012) Using algebraic signatures to check data possession in cloud storage. In: Future generation computer systems. Elsevier
Juels A, Kaliski BS (2007) PORs: proofs of retrievability for large files. In: ACM conference on computer and communications security
Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of 14th international conference on theory and application of cryptology and information security: advances in cryptology
Dodis Y, Vadhan SP, Wichs D (2009) Proofs of retrievability via hardness amplification. ACM TCC-2009, pp 109–127
Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: theory and implementation. In: ACM workshop on cloud computing security, pp 43–45
Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM conference on computer and communications security, pp 187–198
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM, IEEE
Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437
Zhu Y, Wang H, Hu Z, Ahn G-J, Hu H, Yau SS (2012) Cooperative provable data possession. In: Cryptology ePrint archive, report 2012(234), pp 257–265
Litwin W, Schwarz TJE (2004) Algebraic signatures for scalable, distributed data structures. In: ICDE04, Boston, MA, pp 412–423
Schwarz TJE, Miller EL (2006) Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceedings of ICDCS06, p 12
Stinson D, Wei R, Paterson MB (2009) Combinatorial batch codes. Adv Math Commun 3(1):13–27
Brualdi RA, Kiernan KP, Meyer SA, Schroeder MW (2010) Combinatorial batch codes and transversal matroids. Adv Math Commun 4(3):419–431
Bujtas C, Tuza Z (2011) Optimal combinatorial batch codes derived from dual systems. Miskolc Math Notes 12(1):11–23
Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A (2004) Batch codes and their applications. In: Proceedings of the thirty-sixth annual ACM symposium on theory of computing. ACM, pp 262–271
Download XenServer 6.2 (2014) http://xenserver.org/open-source-virtualization-download.html
Cloudera Downloads Get Started With Hadoop (2014) http://www.cloudera.com/content/cloudera/en/downloads.html
Acknowledgements
The authors would like to thank the anonymous reviewers and our colleagues for their suggestions to improve the manuscript.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Saxena, R., Dey, S. A curious collaborative approach for data integrity verification in cloud computing. CSIT 5, 407–418 (2017). https://doi.org/10.1007/s40012-017-0172-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40012-017-0172-x