Advertisement

An Efficient Audit Scheme for Cloud Storage

  • Ohmin Kwon
  • Dongyoung Koo
  • Yongjoo Shin
  • Hyunsoo Yoon
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 301)

Abstract

As Internet technology has grown rapidly, a cloud storage service becomes more very popular and widespread recently. Since there is no guarantee for integrity of data in the cloud storage, audit mechanisms for outsourced data were proposed. However, the conventional audit process requires a lot of computation overheads due to the complex operations used in tag generation and verification. In this paper, we propose a light-weight audit scheme for the cloud storage with efficient cryptographic operations. While keeping high efficiency, our proposed scheme guarantees the consistency of data in the cloud storage. To evaluate the performance of our scheme, we measure the computation costs and the time required for audit process. As a result, our proposed scheme can provide correctness of auditing for outsourced data by an efficient manner.

Keywords

Audit Data integrity Cloud storage Efficiency 

Notes

Acknowledgments

This work was supported by the IT R&D program of MKE/KEIT [10041244, SmartTV 2.0 Software Platform] and the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MEST) (No. 2011-0016584).

References

  1. 1.
    Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, CCS ‘07, ACM, New York, USA, pp 598–609Google Scholar
  2. 2.
    Juels A, Kaliski Jr, BS (2007) Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on computer and communications security, CCS ‘07, ACM, New York, USA, pp 584–597Google Scholar
  3. 3.
    Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of the 14th international conference on the theory and application of cryptology and information security: advances in cryptology. ASIACRYPT ‘08, Springer, Berlin, pp 90–107Google Scholar
  4. 4.
    Wang C, Chow S, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375CrossRefMathSciNetGoogle Scholar
  5. 5.
    Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726CrossRefGoogle Scholar
  6. 6.
    Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  • Ohmin Kwon
    • 1
  • Dongyoung Koo
    • 1
  • Yongjoo Shin
    • 1
  • Hyunsoo Yoon
    • 1
  1. 1.Department of Computer ScienceKorea Advanced Institute of Science and Technology (KAIST)YuseongRepublic of Korea

Personalised recommendations