Skip to main content

Abstract

Data storage of cloud services has increased rates of acceptance due to their flexibility and the concern of the security and confidentiality levels. Many of the integrity and security problems raised based on the differences between client and service provider for resolution of third-party auditor. This review paper gives a brief view of current data integrity and security issues in the distributed cloud computing environment. The paper compared eight different models of the cloud data integrity and security. It highlights nearly solutions for some of the current cloud security risks and challenges by summarizing the key schemes of the privacy-preserving public auditing, particularly access control, attribute-based access control, and public key encryption. Moreover, the paper assigning the existing models, algorithms, and methodologies of data integrity and security had done in the literature of distributed cloud security. It suggested further research in cloud security domain regarding many of the security and data integrity issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese G, Burns R, Curtmola R et al (2007) Provable data possession at untrusted stored. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, pp 598–609

    Google Scholar 

  2. Shah MA, Baker M, Mogul JC, Swaminathan R (2007) Auditing to keep online storage services honest. In: HOTOS’07: proceedings of the 11th USENIX workshop on hot topics in operating systems, Berkeley, CA, USA, pp 1–6

    Google Scholar 

  3. Erway C, Küpçü A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference on computer and communication security (CCS), New York, NY, USA, pp 213–222

    Google Scholar 

  4. Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437

    Article  Google Scholar 

  5. Barsoum AF, Hasan MA (2011) On verifying dynamic multiple data copies over cloud servers. In: Cryptology ePrint Archive, Report 2011/447. http://eprint.iacr.org/

  6. Juels A, Kaliski BS Jr (2007) PORs: proofs of retrievability for large files. In: Proceedings of CCS. ACM, pp 583–597

    Google Scholar 

  7. Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of ASIACRYPT. Springer, pp 90–107

    Google Scholar 

  8. Wang C, Chow SS, Wang Q, Ren K, Lou W (2013) Privacypreserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375

    Article  MathSciNet  MATH  Google Scholar 

  9. Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans Comput Soc Syst 2(4):159–170

    Article  Google Scholar 

  10. Sookhak M, Gani A, Talebian H, Akhunzada A, Khan SU, Buyya R, Zomaya AY (2015) Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput Surv 47(4):159–170

    Article  Google Scholar 

  11. Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of SecureComm. ACM

    Google Scholar 

  12. Shi E, Stefanov E, Papamanthou C (2013) Practical dynamic proofs of retrievability. In: Proceedings of CCS. ACM, pp 325–336

    Google Scholar 

  13. Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726

    Article  Google Scholar 

  14. Sookhak M, Gani A, Khan MK, Buyya R. Dynamic remote data auditing for securing big data storage in cloud computing (to appear). https://doi.org/10.1016/j.ins.2015.09.004

  15. Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 proceedings IEEE. IEEE, pp 1–9

    Google Scholar 

  16. Wang C, Chow SSM, Wang Q, Ren K, Lou W. Privacy preserving public auditing for secure cloud storage. http://eprint.iacr.org/2009/579.pdf

  17. Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  18. Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232

    Article  Google Scholar 

  19. Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40(5):1703–1713

    Article  Google Scholar 

  20. Meenakshi IK, George S (2014) Cloud server storage security using TPA. Int J Adv Res Comput Sci Technol (IJARCST). ISSN: 2347-9817

    Google Scholar 

  21. Tejaswini KS, Prashanth SK (2013) Privacy preserving and public auditing service for data storage in cloud computing. Indian J Res PARIPEX 2(2)

    Google Scholar 

  22. Santosh J, Nandwalkar BR. Privacy preserving and batch auditing in secure cloud data storage using AES. In: Proceedings of 13th IRF international conference. ISBN: 978-93-84209-37-72014

    Google Scholar 

  23. Ezhil Arasu S, Gowri B, Ananthi S (2013) Privacy-preserving public auditing in cloud using HMAC algorithm. Int J Recent Technol Eng (IJRTE). ISSN: 2277, 3878

    Google Scholar 

  24. Wang C, Wang Q, Ren K, Cao N, Lou W (2011) Towards secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232

    Article  Google Scholar 

  25. Morea S, Chaudhari S (2016) Third party public auditing scheme for cloud storage. Int J Procedia Comput Sci 79:69–76

    Article  Google Scholar 

  26. Berger S, Garion S, Moatti Y, Naor D, Pendarakis D, ShulmanPeleg A, Rao JR, Valdez E, Weinsberg Y (2016) Security intelligence for cloud management infrastructures. IBM J Res Dev 60(4):11:1–11:13

    Google Scholar 

  27. Secure access control for cloud storage. https://www.research.ibm.com/haifa/projects/storage/cloudstorage/secureaccess.shtml

  28. Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO 2005. LNCS, vol 3621, pp 258–275

    Google Scholar 

  29. Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9(1):1–30

    Article  MATH  Google Scholar 

  30. Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure rolebased access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960

    Article  Google Scholar 

  31. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, pp 89–98

    Google Scholar 

  32. Hu VC, Kuhn DR, Ferraiolo DF (2015) Attribute-based access control. IEEE Comput 48(2):85–88

    Article  Google Scholar 

  33. Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: PKC 2011. LNCS, vol 6571, pp 90–108

    Google Scholar 

  34. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), pp 321–334

    Google Scholar 

  35. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC 2011, LNCS, vol 6571, pp 53–70

    Google Scholar 

  36. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. INFOCOM 2010:534–542

    Google Scholar 

  37. Huang J, Chiang C, Liao I (2013) An efficient attribute-based encryption and access control scheme for cloud storage environment. In: Grid and pervasive computing GPC 2013, LNCS, vol 7861, pp 453–463

    Google Scholar 

  38. Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on computer and communications security, CCS 2010, pp 735–737

    Google Scholar 

  39. Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143

    Article  Google Scholar 

  40. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754

    Article  Google Scholar 

  41. Wu Y, Wei Z, Deng RH (2013) Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Trans Multimedia 15(4):778–788

    Article  Google Scholar 

  42. Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282

    Article  Google Scholar 

  43. Sahai HS, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: CRYPTO 2012. LNCS, vol 7417, pp 199–217

    Google Scholar 

  44. Yang K, Jia X, Ren K (2015) Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans Parallel Distrib Syst 26(12):3461–3470

    Article  Google Scholar 

  45. Liang K, Fang L, Wong DS, Susilo W (2015) A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency Comput Pract Experience 27(8):2004–2027

    Article  Google Scholar 

  46. Yang G, Tan CH, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test. In: Topics in cryptology—CT-RSA 2010. LNCS, vol 5985, pp 119–131

    Google Scholar 

  47. Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Information security and privacy—16th Australasian conference, ACISP 2011. LNCS, vol 6812, pp 389–406

    Google Scholar 

  48. Tang Q (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. IJACT 2(4):304–321

    Article  MathSciNet  MATH  Google Scholar 

  49. Wang H (2015) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328–340

    Article  Google Scholar 

  50. Curtmola R, Khan O, Burns R et al (2008) MR-PDP: multiple-replica provable data possession. In: The international conference on distributed computing systems. IEEE Computer Society, pp 411–420

    Google Scholar 

  51. Guan C, Ren K, Zhang F, Kerschbaum F, Yu J (2015) Symmetric key based proofs of retrievability supporting public verification. In: Computer security—ESORICS. Springer, Cham, Switzerland, pp 203–223

    Google Scholar 

  52. Shen W, Yu J, Xia H, Zhang H, Lu X, Hao R (2017) Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J Netw Comput Appl 82:56–64

    Article  Google Scholar 

  53. Yu J, Ren K, Wang C, Varadharajan V (2015) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167–1179

    Article  Google Scholar 

  54. Yu J, Ren K, Wang C (2016) Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans Inf Forensics Secur 11(6):1362–1375

    Article  Google Scholar 

  55. Yu J, Wang H (2017) Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans Inf Forensics Secur 12(8):1931–1940

    Article  Google Scholar 

  56. Yu J, Hao R, Xia H, Zhang H, Cheng X, Kong F (2018) Intrusion resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf Sci 442–443:158–172

    Article  MathSciNet  MATH  Google Scholar 

  57. Wang B, Li B, Li H (2012) Oruta: privacy-preserving public auditing for shared data in the cloud. In: Proceedings of IEEE 5th international conference on cloud computing (CLOUD), pp 295–302

    Google Scholar 

  58. Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113:130–139

    Article  Google Scholar 

  59. Fu A, Yu S, Zhang Y, Wang H, Huang C. NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans Big Data (to be published). https://doi.org/10.1109/tbdata.2017.2701347

  60. Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106

    Article  MathSciNet  Google Scholar 

  61. Luo Y, Xu M, Fu S, Wang D, Deng J (2015) Efficient integrity auditing for shared data in the cloud with secure user revocation. In: Proceedings of IEEE Trustcom/BigDataSE/ISPA, pp 434–442

    Google Scholar 

  62. Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176

    Article  Google Scholar 

  63. Yu Y et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778

    Article  Google Scholar 

  64. Wang H, He D, Yu J, Wang Z. Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans Serv Comput (to be published) https://doi.org/10.1109/tsc.2016.2633260

  65. Zhang Y, Yu J, Hao R, Wang C, Ren K. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Depend Secure Comput (to be published). https://doi.org/10.1109/tdsc.2018.2829880

  66. Shen W, Yang G, Yu J, Zhang H, Kong F, Hao R (2017) Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener Comput Syst 76:136–145

    Article  Google Scholar 

  67. Li J, Li J, Xie D, Cai Z (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396

    Article  MathSciNet  MATH  Google Scholar 

  68. Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):3113–3125

    Article  Google Scholar 

  69. Ateniese G, Burns R, Curtmola R (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur 14(1):12

    Article  Google Scholar 

  70. Merkle RC (1980) Protocols for public key cryptosystems. In: IEEE symposium on security & privacy, issue 3, pp 122–122

    Google Scholar 

  71. Kamara S, Lauter K (2010) Cryptographic cloud storage. In: International conference on financial cryptograpy and data security. Springer, pp 136–149

    Google Scholar 

  72. Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing. IEEE, Cairo, pp 1–2

    Google Scholar 

  73. Bellare M, Ran C, Krawczyk H (1996) Message authentication using hash functions—the HMAC construction. Cryptobytes 2

    Google Scholar 

  74. Yang K, Jia X, Ren K (2013) DAC-MACS: effective data access control for multi-authority cloud storage systems. In: INFOCOM, 2013 proceedings IEEE. IEEE, Turin, pp 2895–2903

    Google Scholar 

  75. Hong J, Xue K, Li W (2017) Comments on “DAC-MACS: effective data access control for multiauthority cloud storage systems”/Security analysis of attribute revocation in multiauthority data access control for cloud storage systems. IEEE Trans Inf Forensics Secur 10(6):1315–1317

    Article  Google Scholar 

  76. Wang H, Domingo-Ferrer J, Wu Q, Qin B (2014) Identity-based remote data possession checking in public clouds. IET Inf Secur 8(2):114–121

    Article  Google Scholar 

  77. Tan S, Jia Y (2014) NaEPASC: a novel and efficient public auditing scheme for cloud data. Front Inf Technol Electron Eng 15(9):794–804

    Google Scholar 

  78. Li J, Li J, Chen X (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  MATH  Google Scholar 

  79. Li Y, Yu Y, Min G (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secure Comput (99):1

    Google Scholar 

  80. Yu Y, Xue L, Man HA, Susilo W, Ni J, Zhang Y et al (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener Comput Syst 62(C):85–91

    Google Scholar 

  81. Deswarte Y, Quisquater JJ, Saïdane A (2004) Remote integrity checking. In: Proceedings of 5th working conference on integrity international control in information system (IICIS), pp 1–11

    Google Scholar 

  82. Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319

    Article  MathSciNet  MATH  Google Scholar 

  83. Tian H et al (2017) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10(5):701–714

    Article  Google Scholar 

  84. Peng S, Zhou F, Wang Q, Xu Z, Xu J (2017) Identity-based public multi-replica provable data possession. IEEE Access 5:26990–27001

    Article  Google Scholar 

  85. Shen W, Qin J, Yu J, Hao R, Hu J (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331–346

    Article  Google Scholar 

  86. Zhu Y, Hu HX, Ahn G-J, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244

    Article  Google Scholar 

  87. Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2015) MuRDPA: top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622

    Article  MathSciNet  MATH  Google Scholar 

  88. Hwang G-H, Chen H-F (2016) Efficient real-time auditing and proof of violation for cloud storage systems. In: Proceedings of IEEE 9th international conference on cloud computing (CLOUD), pp 132–139

    Google Scholar 

  89. Jin H, Jiang H, Zhou K (2018) Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans Cloud Comput 6(3):680–693

    Article  Google Scholar 

  90. Küpçü A (2015) Official arbitration with secure cloud storage application. Comput J 58(4):831–852

    Google Scholar 

  91. Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090

    Article  MathSciNet  Google Scholar 

  92. Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circuits Syst Video Technol 26(3):441–452

    Article  Google Scholar 

  93. Singh P, Raman B (2018) Reversible data hiding based on Shamir’s secret sharing for color images over cloud. Inf Sci 422:77–97

    Article  MATH  Google Scholar 

  94. Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. U.S. Patent 6 278 791 B1, 21 Aug 2001

    Google Scholar 

  95. Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  96. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  97. Kim S, Qu X, Sachnev V, Kim HJ. Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Trans Circuits Syst Video Technol (to be published). https://doi.org/10.1109/tcsvt.2018.2878932

  98. Pan W, Coatrieux G, Cuppens N, Cuppens F, Roux C (2010) An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform. In: Proceedings of annual international conference IEEE engineering in medicine and biology (EMBC), 2010, pp 4740–4743

    Google Scholar 

  99. Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120

    Article  Google Scholar 

  100. Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  101. Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans Inf Forensics Secur 6(3):873–882

    Article  Google Scholar 

  102. Ou B, Li X, Zhao Y, Ni R, Shi Y-Q (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021

    Article  MathSciNet  MATH  Google Scholar 

  103. Dragoi I-C, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25(5):2420–2422

    Article  MathSciNet  MATH  Google Scholar 

  104. Wu HZ, Wang W, Dong J, Wang HX (2018) Ensemble reversible data hiding. In: Proceedings of 24th international conference on pattern recognition (ICPR), pp 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdullatif Ghallab .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghallab, A., Saif, M.H., Mohsen, A. (2021). Data Integrity and Security in Distributed Cloud ComputingA Review. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Advances in Intelligent Systems and Computing, vol 1245. Springer, Singapore. https://doi.org/10.1007/978-981-15-7234-0_73

Download citation

Publish with us

Policies and ethics