Fine Grained Updates in Cloud Using Third Party Auditing

Authors(3) :-M Paventhan, C Murugavel, S Rajadurai

Users of cloud storage services no longer physically maintain direct control over their data, which makes data security one of the major concerns of using cloud. Existing research work already allows data integrity to be verified without possession of the actual data file. When the verification is done by a trusted third party, this verification process is also called data auditing and this third party is called an auditor. We call coarse-grained updates. As a result, every small update will cause re-computation and updating of the authenticator for an entire file block, which in turn causes higher storage and communication overheads. We provide a formal analysis for possible types of fine-grained data updates and propose a scheme that can fully support authorized auditing and fine-grained update requests. Based on our scheme, we also propose an enhancement that can dramatically reduce communication overheads for verifying small updates. Theoretical analysis and experimental results demonstrate that our scheme can offer not only enhanced security and flexibility, but also significantly lower overhead for big data applications with a large number of frequent small updates

Authors and Affiliations

M Paventhan
Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
C Murugavel
Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
S Rajadurai
Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Cloud Computing, Data Security, Provable Data Possession Authorized Auditing, Fine-Grained Dynamic Data Update

[1] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,‘‘Cloud Computing and Emerging IT Platforms: Vision, Hype,Reality for Delivering Computing as the 5th Utility,’’ Future Gen.Comput. Syst., vol. 25, no. 6, pp. 599-616, June 2009.

[2] M.Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.Katz, A.Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, andM. Zaharia, ‘‘AViewof Cloud Computing,’’ Commun. ACM, vol. 53, no.4, pp. 50-58,Apr. 2010.

[3] R. Curtmola, O. Khan, R.C. Burns, and G. Ateniese, ‘‘MR-PDP:Multiple-Replica Provable Data Possession,’’ in Proc. 28th IEEEConf. on Distrib. Comput. Syst. (ICDCS), 2008, pp. 411-420.

[4] C. Erway, A. Ku¨ pc¸u¨ , C. Papamanthou, and R. Tamassia,‘‘Dynamic Provable Data Possession,’’ in Proc. 16th ACM Conf.on Comput. and Commun. Security (CCS), 2009, pp. 213-222.

[5] S.E. Schmidt, ‘‘Security and Privacy in the AWS Cloud,’’presented at the Presentation Amazon Summit Australia,Sydney,Australia,May 2012, accessed on: March 25, 2013.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 269-273
Manuscript Number : IJSRSET152240
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

M Paventhan, C Murugavel, S Rajadurai, " Fine Grained Updates in Cloud Using Third Party Auditing , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.269-273, March-April-2015.
Journal URL :

Article Preview

Follow Us

Contact Us