Skip to main content
Log in

A curious collaborative approach for data integrity verification in cloud computing

  • S.I. : Cloud Computing for Scientific and Business Needs
  • Published:
CSI Transactions on ICT Aims and scope Submit manuscript

Abstract

Data integrity verification with high security and minimal overhead is a primary prerequisite for expansion of luminous generation and perception of cloud computing. In present revolution, all the precise data and applications have conveyed towards cloud infrastructure and data center, which run on virtual computing resources in the form of virtual machine. The large scale use of virtualization brings additional security overhead for tenants of a public cloud service. In this paper, we suggested a better and efficient data integrity verification technique that help users to utilize data as a service in cloud computing. The building blocks of our technique are algebraic signature, homomorphic tag, and combinatorial batch codes. Homomorphic tags are assigned a particular verifiable value to each data blocks, which can help us for unleashed data operations on this blocks. The property of algebraic signature is used to aggregate data blocks for file operations. Combinatorial batch codes are used to assign and store integrated data into different distributed cloud server. To demonstrate our approach, we implement an application based on Hadoop and MapReduce framework. We tested this application based on various parameters. Our method has shown the tremendous improvement over the other state of the art methods. The experimental results are demonstrating the effectiveness of the proposed method for data integrity verification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Saxena R, Ruj S, Sarma M (2013) Collaborative model for privacy preservation and data integrity verification in cloud computing. In: Proceedings of the security and privacy symposium, IIT Kanpur, Kanpur, India

  2. Ruj S, Saxena R (2015) Securing cloud data. In: Cloud computing with e-science applications. CRC Press, Boca Raton, pp 41–72, ISBN:978-1-4665-9115-8

  3. Saxena R, Dey S (2016) Cloud audit: a data integrity verification approach for cloud computing. Proc Comput Sci 89:142–151. doi:10.1016/j.procs.2016.06.024 ISSN 1877-0509

    Article  Google Scholar 

  4. Saxena R, Dey S (2014) Collaborative approach for data integrity verification in cloud computing. In: Perez GM, Thampi SM, Ko RKL, Shu L (eds) SNDS, ser. communications in computer and information science. Springer, Berlin, pp 1–15

    Google Scholar 

  5. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of 14th ACM conference computer and communication security, pp 598–609, ACM

  6. Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. ACM SecureCom

  7. Sebe F, Domingo-Ferrer J, Martinez-Balleste A, Deswarte Y, Quisquater JJ (2008) Efficient remote data possession checking in critical information infrastructures. IEEE Trans Knowl Data Eng 20(8):1034–1038

    Article  Google Scholar 

  8. Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference computer and communication security (CCS ’09), pp 213–222

  9. Chen L (2012) Using algebraic signatures to check data possession in cloud storage. In: Future generation computer systems. Elsevier

  10. Juels A, Kaliski BS (2007) PORs: proofs of retrievability for large files. In: ACM conference on computer and communications security

  11. Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of 14th international conference on theory and application of cryptology and information security: advances in cryptology

  12. Dodis Y, Vadhan SP, Wichs D (2009) Proofs of retrievability via hardness amplification. ACM TCC-2009, pp 109–127

  13. Bowers KD, Juels A, Oprea A (2009) Proofs of retrievability: theory and implementation. In: ACM workshop on cloud computing security, pp 43–45

  14. Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage. In: Proceedings of 16th ACM conference on computer and communications security, pp 187–198

  15. Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of IEEE INFOCOM, IEEE

  16. Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  17. Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437

    Article  Google Scholar 

  18. Zhu Y, Wang H, Hu Z, Ahn G-J, Hu H, Yau SS (2012) Cooperative provable data possession. In: Cryptology ePrint archive, report 2012(234), pp 257–265

  19. Litwin W, Schwarz TJE (2004) Algebraic signatures for scalable, distributed data structures. In: ICDE04, Boston, MA, pp 412–423

  20. Schwarz TJE, Miller EL (2006) Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proceedings of ICDCS06, p 12

  21. Stinson D, Wei R, Paterson MB (2009) Combinatorial batch codes. Adv Math Commun 3(1):13–27

    Article  MATH  MathSciNet  Google Scholar 

  22. Brualdi RA, Kiernan KP, Meyer SA, Schroeder MW (2010) Combinatorial batch codes and transversal matroids. Adv Math Commun 4(3):419–431

    Article  MATH  MathSciNet  Google Scholar 

  23. Bujtas C, Tuza Z (2011) Optimal combinatorial batch codes derived from dual systems. Miskolc Math Notes 12(1):11–23

    MATH  MathSciNet  Google Scholar 

  24. Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A (2004) Batch codes and their applications. In: Proceedings of the thirty-sixth annual ACM symposium on theory of computing. ACM, pp 262–271

  25. Download XenServer 6.2 (2014) http://xenserver.org/open-source-virtualization-download.html

  26. Cloudera Downloads Get Started With Hadoop (2014) http://www.cloudera.com/content/cloudera/en/downloads.html

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers and our colleagues for their suggestions to improve the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajat Saxena.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saxena, R., Dey, S. A curious collaborative approach for data integrity verification in cloud computing. CSIT 5, 407–418 (2017). https://doi.org/10.1007/s40012-017-0172-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40012-017-0172-x

Keywords

Navigation