Advertisement

Integrity Checking of Cloud Data with an Auditing Mechanism Using ECC and Merkle Hash Tree

  • T. Suriya Praba
  • V. MeenaEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1116)

Abstract

Cloud computing is a major concerning solution for the raising infrastructure costs in IT. There are many benefits of storing data in cloud. Once the data is stored in cloud it can be accessed from any location at any time. Securing the data in cloud is necessary. Cloud data auditing mechanism is very essential to check the data integrity in cloud. The auditing mechanism is very efficient and advantageous because it reduces the computation effort on both client’s and server’s side. But performing auditing with complete file information is a time-consuming process. In this paper we propose ECC-Merkle Integrity checking system by generating hash values and also, there is no need to retrieve the complete file for auditing. Here Provable data possession also known as PDP is used to check the integrity of data at cloud server which uses a spot-checking technique. Also, it uses Merkle hash tree to generate hash of file. Whenever client wants to check the data integrity, he poses a challenge to the server. The server will generate the hash values as a proof and this will be verified by the client. Secure data transmission is supported by Elliptic Curve Cryptography algorithm, which provides a high level of security with small key size. This provides moderately speed encryption and decryption. Merkle hash tree provides efficient and secure verification of the contents of huge data structures. This concrete methodology makes sure that the data is undamaged, unaltered.

Keywords

Elliptic Curve Cryptography Merkle hash tree Tag Data integrity 

References

  1. 1.
    Liu, F., Tong, J., Mao, J., Rudall, et al.: (1995).  https://doi.org/10.6028/NIST.SP.500-292
  2. 2.
    Sridhar, V., Sheshadri, H.S., Padma, M.C.: Emerging Research in Electronics, Computer Science and Technology: Proceedings of International Conference, ICERECT 2012 (2014). Springer, New Delhi.  https://doi.org/10.1007/978-81-322-1157-0Google Scholar
  3. 3.
    Zhang, X., Du, H.T., Chen, J.Q., et al.: Ensure data security in cloud storage. In: Proceedings–2011 International Conference on Network Computing and Information Security NCIS 2011, vol. 1, pp. 284–287 (2011).  https://doi.org/10.1109/NCIS.2011.64
  4. 4.
    Ateniese, G., Burns, R., Curtmola, R., et al.: Provable Data Possession at Untrusted Stores, p. 598 (2007).  https://doi.org/10.1145/1315245.1315318
  5. 5.
    Bala, I., Bishnoi, S.: Research paper on data integrity checking in cloud computing. Int. J. Enhanc. Res. Manag. Comput. Appl. 4, 2319–7471 (2015)Google Scholar
  6. 6.
    Balasubramanian, V., Mala, T.: Cloud data integrity checking using bilinear pairing and network coding. Cluster Comput. 1–9 (2018).  https://doi.org/10.1007/s10586-018-1805-z
  7. 7.
    Yu, Y., Xue, L., Au, M.H., et al.: Cloud data integrity checking with an identity-based auditing mechanism from RSA. Futur. Gener. Comput. Syst. 62, 85–91 (2016).  https://doi.org/10.1016/j.future.2016.02.003CrossRefGoogle Scholar
  8. 8.
    Jain, N., Jain, P., Kapil, N.: Enhanced data security model for cloud using ECC algorithm and third party auditor, vol. 5, pp. 519–524 (2016)Google Scholar
  9. 9.
    Juels, A., Kaliski Jr., B.S.: PORs: proofs of retrievability for large files. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 584–597 (2007).  https://doi.org/10.1145/1315245.1315317
  10. 10.
    Author Asiacrypt2008Google Scholar
  11. 11.
    Wang, Q., Wang, C., Ren, K., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22, 847–859 (2011).  https://doi.org/10.1109/TPDS.2010.183CrossRefGoogle Scholar
  12. 12.
    Hao, Z., Zhong, S., Nenghai, Yu.: A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans. Knowl. Data Eng. 23, 1432–1437 (2011).  https://doi.org/10.1109/tkde.2011.62CrossRefGoogle Scholar
  13. 13.
    Zhu, Y., Hu, H., Ahn, G.J., Yau, S.S.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85, 1083–1095 (2012).  https://doi.org/10.1016/j.jss.2011.12.024CrossRefGoogle Scholar
  14. 14.
    Zhu, H., Yuan, Y., Chen, Y., et al.: A secure and efficient data integrity verification scheme for cloud-IoT based on short signature. IEEE Access 7, 1 (2019).  https://doi.org/10.1109/access.2019.2924486CrossRefGoogle Scholar
  15. 15.
    Chakraborty, T.K., Dhami, A., Bansal, P., Singh, T.: Enhanced public auditability & secure data storage in cloud computing. In: Proceedings of 2013 3rd IEEE Int Advance Computing Conference IACC 2013, pp. 101–105 (2013).  https://doi.org/10.1109/IAdCC.2013.6514202
  16. 16.
    Saqib Niaz, M., Saake, G.: Merkle hash tree based techniques for data integrity of outsourced data general terms. In: 27th GI-Workshop Found Databases, pp. 66–71 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of ComputingSASTRA Deemed UniversityThanjavurIndia

Personalised recommendations