An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA

被引:1
|
作者
Salim, Abu [1 ]
Tiwari, Rajesh Kumar [2 ]
Tripathi, Sachin [3 ]
机构
[1] Jazan Univ, Coll CS & IT, Dept Comp Sci, Jazan, Saudi Arabia
[2] RVS Coll Engn & Technol, Dept Comp Sci, Jamshedpur, Bihar, India
[3] Indian Inst Technol ISM, Dept Comp Sci & Engn, Dhanbad, Bihar, India
关键词
Efficient public auditing; Secure sharing; Cloud computing; Denial of service attack; Authorized auditing; Iniquitous third party auditor;
D O I
10.1007/s11277-020-07079-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud storage is a cloud based service which delivers scalable on demand on line storage of data and eliminates the need of maintaining local data centre. Storage of data in cloud brings many advantages such as lower-cost, metered service, scalable and ubiquitous access. However, it also raises concerns to its integrity; to save the storage space cloud service provider may delete some rarely access data. Data privacy is another issue which must be addressed to increase data owner's trust. To address above issues, many researchers have proposed public auditing schemes to validate the integrity of data using third party auditor. These schemes generate metadata using data files on the owner side and store these metadata on the cloud storage along with the file data, which helps in auditing. These schemes address many concerns which arise due to remote data storage. However, computation cost involved for metadata generation at the data owner side is not properly addressed; another issue which is not properly addressed is an iniquitous third party auditor may be the source of denial of service attack by issuing constantly large number of audit request. Our scheme solves these issues by lowering the computation cost at data owner side and controlling the number of times a third party auditor can issue an audit request to the cloud storage. Our Scheme also supports secure access of data using conditional proxy re-encryption scheme and delegation of auditing task by the authorized third party auditor to another auditor for the specified period of times in the case of unavailability of authorized third party auditor.
引用
收藏
页码:2929 / 2954
页数:26
相关论文
共 50 条
  • [21] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [22] An Efficient Public Auditing Scheme for Multi-Cloud Storage
    Yu, Haiyang
    Cai, Yongquan
    Kong, Shanshan
    Xue, Fei
    Allah, Ditta
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 81 - 96
  • [23] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [24] A Secure and Efficient Revocation Scheme for Fine-Grained Access Control in Cloud Storage
    Lv, Zhiquan
    Hong, Cheng
    Zhang, Min
    Feng, Dengguo
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [25] An efficient and secure public batch auditing protocol for dynamic cloud storage data
    Yang, Liu
    Xia, Lili
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 671 - 675
  • [26] PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage
    Li, Haifeng
    Wang, Yuxin
    Fu, Xingbing
    Lan, Caihui
    Wang, Caifen
    Li, Fagen
    Guo, He
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [27] Public Proof of Retrievability Scheme against Active Attack in Cloud Storage
    Zhang, Jianhong
    Tang, Wenjing
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION ENGINEERING, 2014, 111 : 29 - 32
  • [28] Secure and efficient client-side data deduplication with public auditing in cloud storage
    Dang, Qianlong
    Ma, Hua
    Liu, Zhenhua
    Xie, Ying
    International Journal of Network Security, 2020, 22 (03) : 462 - 475
  • [29] An Efficient Defense Scheme Against SIP DoS Attack in SDN Using Cloud SFW
    Liu, ZengGuang
    Yin, XiaoChun
    Lee, Hoon Jae
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 52 - 55
  • [30] Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
    Liu, Hongyu
    Chen, Leiting
    Davar, Zahra
    Pour, Mohammad Ramezanian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 473 - 482