TSAS: Third-Party Storage Auditing Service

  • Kan YangEmail author
  • Xiaohua Jia
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


In cloud storage systems, data owners host their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, this new paradigm of data hosting service also introduces new security challenges, which requires an independent auditing service to check the data integrity in the cloud. In large-scale cloud storage systems, the data may be updated dynamically, so existing remote integrity checking methods served for static archive data are no longer applicable to check the data integrity. Thus, an efficient and secure dynamic auditing protocol is desired to convince data owners that the data is correctly stored in the cloud. In this chapter, we first introduce an auditing framework for cloud storage systems. Then, we describe Third-party Storage Auditing Scheme (TSAS), an efficient and privacy-preserving auditing protocol for cloud storage, which can also support data dynamic operations and batch auditing for both multiple owners and multiple clouds.


Batch Auditing Audit Protocol Dynamic Auditing Cloud Storage System Cloud Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security (CCS’07), pp. 598–609. ACM (2007)Google Scholar
  3. 3.
    Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on Security and privacy in communication networks (SecureComm’08), pp. 1–10. ACM (2008)Google Scholar
  4. 4.
    Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Proceedings of the15th international conference on the theory and application of cryptology and information security: advances in cryptology—ASIACRYPT’09, pp. 319–333. Springer (2009)Google Scholar
  5. 5.
    Bairavasundaram, L.N., Goodson, G.R., Pasupathy, S., Schindler, J.: An analysis of latent sector errors in disk drives. In: Proceedings of the 2007 ACM SIGMETRICS International conference on measurement and modeling of computer systems (SIGMETRICS’07), pp. 289–300. ACM (2007)Google Scholar
  6. 6.
    Deswarte, Y., Quisquater, J., Saidane, A.: Remote integrity checking. In: The sixth working conference on integrity and internal control in information systems (IICIS). Springer, Netherlands (2004)Google Scholar
  7. 7.
    Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. In: Proceedings of the 6th theory of cryptography conference (TCC’09), pp. 109–127. Springer (2009)Google Scholar
  8. 8.
    Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM conference on computer and communications security (CCS’09), pp. 213–222. ACM (2009)Google Scholar
  9. 9.
    Filho, D.L.G., Barreto, P.S.L.M.: Demonstrating data possession and uncheatable data transfer. IACR Cryptology ePrint Archive 2006, 150 (2006)Google Scholar
  10. 10.
    Goldreich, O.: Zero-knowledge twenty years after its invention. Electron. Colloquium Comput. Complex. 63 (2002)Google Scholar
  11. 11.
    Goodson, G.R., Wylie, J.J., Ganger, G.R., Reiter, M.K.: Efficient byzantine-tolerant erasure-coded storage. In: Proceedings of the 2004 international conference on dependable systems and networks (DSN’04), pp. 135–144. IEEE Computer Society (2004)Google Scholar
  12. 12.
    Juels, A., Jr., Kaliski, B.S.: PORS: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security (CCS’07), pp. 584–597. ACM (2007)Google Scholar
  13. 13.
    Kher, V., Kim, Y.: Securing distributed storage: challenges, techniques, and systems. In: Proceedings of the 2005 ACM workshop on storage security and survivability (StorageSS05), pp. 9–25. ACM (2005)Google Scholar
  14. 14.
    Li, J., Krohn, M.N., Mazières, D., Shasha, D.: Secure untrusted data repository (sundr). In: Proceedings of the 6th conference on symposium on operating systems design and implementation, pp. 121–136. Berkeley, CA, USA (2004)Google Scholar
  15. 15.
    Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative internet backup scheme. In: Proceedings of the general track: 2003 USENIX annual technical conference, pp. 29–41. USENIX (2003)Google Scholar
  16. 16.
    Mell, P., Grance, T.: The NIST definition of cloud computing. Tech. report, National Institute of Standards and Technology (2009)Google Scholar
  17. 17.
    Naor, M., Rothblum, G.N.: The complexity of online memory checking. J. ACM 56(1), 1–46 (2009)Google Scholar
  18. 18.
    Schroeder, B., Gibson, G.A.: Disk failures in the real world: What does an mttf of 1, 000, 000 hours mean to you. In: Proceedings of the 5th USENIX conference on file and storage technologies (FAST’07), pp. 1–16. USENIX (2007)Google Scholar
  19. 19.
    Schwarz, T.J.E., Miller, E.L.: Store, forget, and check: Using algebraic signatures to check remotely administered storage. In: Proceedings of the 26th IEEE international conference on distributed computing systems (ICDCS’06) (2006)Google Scholar
  20. 20.
    Sebé, F., Domingo-Ferrer, J., Martínez-Ballesté, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034–1038 (2008)CrossRefGoogle Scholar
  21. 21.
    Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th international conference on the theory and application of cryptology and information security: advances in cryptology—ASIACRYPT’08, pp. 90–107. Springer (2008)Google Scholar
  22. 22.
    Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R.: Auditing to keep online storage services honest. In: Proceedings of the 11th workshop on hot topics in operating systems (HotOS’07). USENIX Association (2007)Google Scholar
  23. 23.
    Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. IACR Cryptology ePrint Archive 2008, 186 (2008)Google Scholar
  24. 24.
    Velte, T., Velte, A., Elsenpeter, R.: Cloud computing: a practical approach, 1 edn., chap. 7. McGraw-Hill Inc., New York (2010)Google Scholar
  25. 25.
    Wang, C., Ren, K., Lou, W., Li, J.: Toward publicly auditable secure cloud data storage services. IEEE Netw. 24(4), 19–24 (2010)CrossRefGoogle Scholar
  26. 26.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 29th IEEE international conference on computer communications (INFOCOM’10), pp. 525–533. IEEE (2010)Google Scholar
  27. 27.
    Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRefGoogle Scholar
  28. 28.
    Yamamoto, G., Oda, S., Aoki, K.: Fast integrity for large data. In: Proceedings of the ECRYPT workshop on software performance enhancement for encryption and decryption, pp. 21–32. ECRYPT, Amsterdam, the Netherlands (2007)Google Scholar
  29. 29.
    Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)CrossRefGoogle Scholar
  30. 30.
    Zeng, K.: Publicly verifiable remote data integrity. In: Proceedings of the 10th international conference on information and communications security (ICICS’08), pp. 419–434. Springer (2008)Google Scholar
  31. 31.
    Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12) 2231–2244 (2012)Google Scholar
  32. 32.
    Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceedings of the 2011 ACM symposium on applied computing (SAC’11), pp. 1550–1557. ACM (2011)Google Scholar

Copyright information

© The Author(s) 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceCity University of Hong KongKowloonHong Kong SAR

Personalised recommendations