An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA

被引:1
|
作者
Salim, Abu [1 ]
Tiwari, Rajesh Kumar [2 ]
Tripathi, Sachin [3 ]
机构
[1] Jazan Univ, Coll CS & IT, Dept Comp Sci, Jazan, Saudi Arabia
[2] RVS Coll Engn & Technol, Dept Comp Sci, Jamshedpur, Bihar, India
[3] Indian Inst Technol ISM, Dept Comp Sci & Engn, Dhanbad, Bihar, India
关键词
Efficient public auditing; Secure sharing; Cloud computing; Denial of service attack; Authorized auditing; Iniquitous third party auditor;
D O I
10.1007/s11277-020-07079-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Cloud storage is a cloud based service which delivers scalable on demand on line storage of data and eliminates the need of maintaining local data centre. Storage of data in cloud brings many advantages such as lower-cost, metered service, scalable and ubiquitous access. However, it also raises concerns to its integrity; to save the storage space cloud service provider may delete some rarely access data. Data privacy is another issue which must be addressed to increase data owner's trust. To address above issues, many researchers have proposed public auditing schemes to validate the integrity of data using third party auditor. These schemes generate metadata using data files on the owner side and store these metadata on the cloud storage along with the file data, which helps in auditing. These schemes address many concerns which arise due to remote data storage. However, computation cost involved for metadata generation at the data owner side is not properly addressed; another issue which is not properly addressed is an iniquitous third party auditor may be the source of denial of service attack by issuing constantly large number of audit request. Our scheme solves these issues by lowering the computation cost at data owner side and controlling the number of times a third party auditor can issue an audit request to the cloud storage. Our Scheme also supports secure access of data using conditional proxy re-encryption scheme and delegation of auditing task by the authorized third party auditor to another auditor for the specified period of times in the case of unavailability of authorized third party auditor.
引用
收藏
页码:2929 / 2954
页数:26
相关论文
共 50 条
  • [41] An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
    Libing Wu
    Biwen Chen
    Sherali Zeadally
    Debiao He
    Soft Computing, 2018, 22 : 7685 - 7696
  • [42] Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme
    Li, Haifeng
    Liu, Liangliang
    Lan, Caihui
    Wang, Caifen
    Guo, He
    IEEE ACCESS, 2020, 8 : 86797 - 86809
  • [43] An access control and authentication scheme for secure data sharing in the decentralized cloud storage system
    Khatiwada, Pankaj
    Yang, Bian
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 137 - 144
  • [44] Secure and efficient fine-grained data access control scheme in cloud computing
    Yang, Changsong
    Ye, Jun
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 259 - 271
  • [45] A secure and lightweight cloud data deduplication scheme with efficient access control and key management
    Tang, Xinyu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Jiang, Xueru
    Liu, Yining
    COMPUTER COMMUNICATIONS, 2024, 222 : 209 - 219
  • [46] An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    Kim, CH
    Hwang, YH
    Lee, PJ
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 359 - 373
  • [47] Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers
    Susilo, Willy
    Jiang, Peng
    Lai, Jianchang
    Guo, Fuchun
    Yang, Guomin
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 2138 - 2148
  • [48] SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage
    Xiong, Shuming
    Ni, Qiang
    Wang, Liangmin
    Wang, Qian
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2914 - 2927
  • [49] Secure, efficient and revocable multi-authority access control system in cloud storage
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Liu, Ximeng
    Xiong, Jinbo
    Chen, Danwei
    COMPUTERS & SECURITY, 2016, 59 : 45 - 59
  • [50] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    AUTOMATIKA, 2023, 64 (04) : 1072 - 1079