Fine Grained Updates in Cloud Using Third Party Auditing

Authors

  • M Paventhan  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • C Murugavel  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
  • S Rajadurai  Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Keywords:

Cloud Computing, Data Security, Provable Data Possession Authorized Auditing, Fine-Grained Dynamic Data Update

Abstract

Users of cloud storage services no longer physically maintain direct control over their data, which makes data security one of the major concerns of using cloud. Existing research work already allows data integrity to be verified without possession of the actual data file. When the verification is done by a trusted third party, this verification process is also called data auditing and this third party is called an auditor. We call coarse-grained updates. As a result, every small update will cause re-computation and updating of the authenticator for an entire file block, which in turn causes higher storage and communication overheads. We provide a formal analysis for possible types of fine-grained data updates and propose a scheme that can fully support authorized auditing and fine-grained update requests. Based on our scheme, we also propose an enhancement that can dramatically reduce communication overheads for verifying small updates. Theoretical analysis and experimental results demonstrate that our scheme can offer not only enhanced security and flexibility, but also significantly lower overhead for big data applications with a large number of frequent small updates

References

[1] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,‘‘Cloud Computing and Emerging IT Platforms: Vision, Hype,Reality for Delivering Computing as the 5th Utility,’’ Future Gen.Comput. Syst., vol. 25, no. 6, pp. 599-616, June 2009.

[2] M.Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.Katz, A.Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, andM. Zaharia, ‘‘AViewof Cloud Computing,’’ Commun. ACM, vol. 53, no.4, pp. 50-58,Apr. 2010.

[3] R. Curtmola, O. Khan, R.C. Burns, and G. Ateniese, ‘‘MR-PDP:Multiple-Replica Provable Data Possession,’’ in Proc. 28th IEEEConf. on Distrib. Comput. Syst. (ICDCS), 2008, pp. 411-420.

[4] C. Erway, A. Ku¨ pc¸u¨ , C. Papamanthou, and R. Tamassia,‘‘Dynamic Provable Data Possession,’’ in Proc. 16th ACM Conf.on Comput. and Commun. Security (CCS), 2009, pp. 213-222.

[5] S.E. Schmidt, ‘‘Security and Privacy in the AWS Cloud,’’presented at the Presentation Amazon Summit Australia,Sydney,Australia,May 2012, accessed on: March 25, 2013.

Downloads

Published

2015-04-25

Issue

Section

Research Articles

How to Cite

[1]
M Paventhan, C Murugavel, S Rajadurai, " Fine Grained Updates in Cloud Using Third Party Auditing , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.269-273, March-April-2015.