Fine Grained Updates in Cloud Using Third Party Auditing
Keywords:
Cloud Computing, Data Security, Provable Data Possession Authorized Auditing, Fine-Grained Dynamic Data UpdateAbstract
Users of cloud storage services no longer physically maintain direct control over their data, which makes data security one of the major concerns of using cloud. Existing research work already allows data integrity to be verified without possession of the actual data file. When the verification is done by a trusted third party, this verification process is also called data auditing and this third party is called an auditor. We call coarse-grained updates. As a result, every small update will cause re-computation and updating of the authenticator for an entire file block, which in turn causes higher storage and communication overheads. We provide a formal analysis for possible types of fine-grained data updates and propose a scheme that can fully support authorized auditing and fine-grained update requests. Based on our scheme, we also propose an enhancement that can dramatically reduce communication overheads for verifying small updates. Theoretical analysis and experimental results demonstrate that our scheme can offer not only enhanced security and flexibility, but also significantly lower overhead for big data applications with a large number of frequent small updates
References
[1] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg,
and I. Brandic,‘‘Cloud Computing and Emerging IT Platforms: Vision,
Hype,Reality for Delivering Computing as the 5th Utility,’’ Future Gen.Comput.
Syst., vol. 25, no. 6, pp. 599-616, June 2009.
[2] M.Armbrust, A. Fox, R. Griffith, A.D. Joseph,
R.Katz, A.Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, andM. Zaharia,
‘‘AViewof Cloud Computing,’’ Commun. ACM, vol. 53, no.4, pp. 50-58,Apr. 2010.
[3] R. Curtmola, O. Khan, R.C. Burns, and G.
Ateniese, ‘‘MR-PDP:Multiple-Replica Provable Data Possession,’’ in Proc. 28th
IEEEConf. on Distrib. Comput. Syst. (ICDCS), 2008, pp. 411-420.
[4] C. Erway, A. Ku¨ pc¸u¨ , C. Papamanthou, and R.
Tamassia,‘‘Dynamic Provable Data Possession,’’ in Proc. 16th ACM Conf.on
Comput. and Commun. Security (CCS), 2009, pp. 213-222.
[5] S.E. Schmidt, ‘‘Security and Privacy in the AWS
Cloud,’’presented at the Presentation Amazon Summit
Australia,Sydney,Australia,May 2012, accessed on: March 25, 2013.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.