Implementation On Privacy-Preserving Public Auditing for Shared Data in the Cloud
Keywords:
Data Storage, Privacy-Preserving, Public Auditability, Cloud Computing, Third Party Auditing(TPA).Abstract
In cloud computing, the way that organizations manage their data, due to its low cost and ubiquitous nature. Users access the application and enjoy the on-demand high quality information’s and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. This paper introduces a cloud database storage architecture, this approach prevents the risk of both external and internal attack to the outsourced data. the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained computing resources. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. Enhanced and secured third-party auditing, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. In this paper, we propose a secure cloud storage system supporting privacy-preserving public auditing. furthermore, TPA is trusted and capable of accessing the cloud storage to performed auditing. extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently, Extensive security and performance analysis show the proposed schemes are provably secure and highly efficient. Our preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
References
- S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski,Top-k Retrieval from a Confidential Index," Proc. Int'l Conf. Extending Database Technology: Advances in Database Technology (EDBT '09), 2009.
- J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing," Proc. IEEE Infocom '10, 2010.
- N. Cao, C. Wang, K. Ren, and W. Lou, "Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE Infocom '11, 2011.
- C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, "Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data," Proc. IEEE INFOCOM, 2012.
- Cong Wang, Ning Cao, KuiRen and Wenjing Lou, "Enabling Secure and Efficient Rank Keyword Search over Outsourced Cloud Data" IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 8, August 2012.
- Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," To appear, IEEE Transactions on Service Computing (TSC).
- A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer, 2009.
- M. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383–392. IEEE, 2011.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.