Abstract
The rapid development of cloud storage in these years has caused a wave of research craze. To improve the cloud user experience, a large amount of schemes are proposed with various practical performances, for instance, long term correct data storage and dynamic data modification. In most works, however, the authors seem to completely ignore the hard fact that data owner alone could not have enough energy to discover and correct all the inappropriate data outsourced in cloud. Others did consider it, and gave more than one user both read and write permissions, which leads to chaotic management of multiusers. In this paper, we propose a novel algorithm, in which the data owner and several authenticated assistants form a team to support dynamic data modification together. Assistants are in charge of detecting problems in cloud data and discussing a corresponding modification suggestion, while data owner is responsible for the implementation of the modification. In addition, our algorithm supports identity authentication, efficient malicious assistant revocation, as well as lazy update. Sufficient numerical analysis validates the performance of our algorithm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 50 (2011)
Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(15), 843–859 (2013)
Dudin, E.B., Smetanin, Y.G.: A review of cloud computing. Sci. Tech. Inf. Process. 38(38), 280–284 (2011)
Zeng, W., Zhao, Y., Ou, K., Song, W.: Research on cloud storage architecture and key technologies. In: Proceedings of the International Conference on Interaction Sciences: Information Technology, Culture and Human 2009, Seoul, Korea, 24–26 November, pp. 1044–1048 (2009)
Wang, Q., He, M., Du, M., Chow, S.S.M., Lai, R.W.F., Zou, Q.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016). doi:10.1109/TDSC.2016.25934446
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)
Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, New York (2009)
Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web-Internet Web Inf. Syst. 15(4), 409–428 (2011)
Xiao, Z., Xiao, Y., Chen, H.: An accountable framework for sensing-oriented mobile cloud computing. J. Internet Technol. 15(5), 813–822 (2014)
He, D., Zeadally, S., Kumar, N., Lee, J.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99), 1–12 (2016)
Zhang, Q., Chen, Z., Len, Y.: Distributed fuzzy c-means algorithms for big sensor data based on cloud computing. Int. J. Sens. Netw. 18(1/2), 32–39 (2015)
Ren, Y., Shen, J., Wang, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the IEEE International Conference on Computer Communication, pp. 2121–2129 (2014)
Rakesh, J., Krishna, J.V.: A novel approach for secure data sharing in multi-owner groups in cloud. Int. J. Comput. Trends Technol. 16(1), 20–23 (2014)
He, D., Zeadally, S.: Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1), 71–77 (2015)
Baskar, H.: Fully secure and efficient data sharing with attribute revocation for multi-owner cloud storage. Int. J. Adv. Res. Educ. Technol. 3(2), 835–838 (2015)
Wang, B., Li, H., Liu, X., Li, X., Li, F.: Preserving identity privacy on multi-owner cloud data during public verification. Secur. Commun. Netw. 7(11), 2104–2113 (2013)
Suba, J.: Multi owner data sharing with privacy preserving in cloud security mediator. Int. J. Sci. Res. 3(3), 41–44 (2014)
Tasmiya, S.K., Kausar, F.: An efficient approach to share data in cloud with multi-owner groups. Int. J. Comput. Technol. 1(3), 137–141 (2014)
Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–333 (2011)
Sun, D., Chang, G., Miao, C., Wang, X.: Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments. Int. J. Secur. Netw. 7(4), 196–210 (2012)
Femilshini, F., Ganeshkarthikeyan, V., Janani, S.: Privacy preserving revocation update protocol for group signature in cloud. In: Proceedings of the IEEE International Conference on Engineering and Technology, pp. 1–5. IEEE (2015)
Zagade, P., Yadav, S., Shah, A., Bachate, R.: Group user revocation and integrity auditing of shared data in cloud environment. Int. J. Comput. Appl. 128(12), 22–25 (2015)
Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 295–302 (2012)
Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the 32nd IEEE International Conference on Computer Communication, Turin, Italy, pp. 2904–2912 (2013)
Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multi-user modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1 (2015)
Green, M.: The threat in the cloud. IEEE Secur. Priv. 11(1), 86–89 (2013)
Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2506573
Hu, S., Wang, Q., Wang, J., Qin, Z., Ren, K.: Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25(7), 3411–3425 (2016)
He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. PP(99), 1–10 (2015)
Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)
Santos, D., Nascimento, T., Westphall, C., Leandro, M., Westphall, C.: Privacy-preserving identity federations in the cloud: a proof of concept. Int. J. Secur. Netw. 9(1), 1–11 (2014)
Khorshed, M.T., Ali, A.B.M.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)
Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Incio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2014)
Soares, L.F.B., Fernandes, D.A.B., Gomes, J.V., Freire, M.M., Incio, P.R.: Cloud Security: State of the Art, Security, Privacy and Trust in Cloud Systems, pp. 3–44. Springer, Heidelberg (2014)
Chraibi, M., Harroud, H., Maach, A.: Classification of security issues and solutions in cloud environments. In: Proceedings of the International Conference on Information Integration and Web-Based Applications & Services. ACM (2013)
Chen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security. Univ. Calif. Berkeley Rep. 20(2010), 2010–2015 (2010)
Ju, H.: Intelligent disaster recovery structure and mechanism for cloud computing network. Int. J. Sens. Netw. 16(2), 70–76 (2014)
Barua, M., Liang, X., Lu, R., Shen, X.: ESPAC: enabling security and patient-centric access control for eHealth in cloud computing. Int. J. Secur. Netw. 6(2/3), 67–76 (2011)
Boampong, P.A., Wahsheh, L.A.: Different facets of security in the cloud. In: Proceedings of the 15th Communications and Networking Simulation Symposium. Society for Computer Simulation International (2012)
Shen, J., Moh, S., Chung, I.: Identity-based key agreement protocol employing a symmetric balanced incomplete block design. J. Commun. Netw. 14(14), 682–691 (2012)
Xiao, Z., Xiao, Y.: Achieving accountable MapReduce in cloud computing. Future Gener. Comput. Syst. 30(1), 1–13 (2014). (Elsevier)
Lawal, B.: Incomplete block design. In: Lawal, B. (ed.) Applied Statistical Methods in Agriculture, Health and Life Sciences, pp. 639–659. Springer International Publishing, Heidelberg (2014)
Lee, O., Yoo, S., Park, B., Chung, I.: The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design. Inf. Sci. 176(15), 2148–2160 (2006)
Shen, J., Moh, S., Chung, I.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)
Xiao, Z., Xiao, Y.: Accountable MapReduce in cloud computing. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1082–1087 (2011)
Mbegbu, J.I.: Some designs from symmetric balanced incomplete block design. J. Niger. Assoc. Math. Phy. 17, 363–366 (2013)
Shen, J., Zheng, W., Wang, J., Zheng, Y., Sun, X.: An efficient verifiably encrypted signature from Weil pairing. J. Internet Technol. 14(6), 682–691 (2012)
Acknowledgments
This work is supported by the National Science Foundation of China under Grant No. 61300237, No. U1536206, No. U1405254, No. 61232016 and No. 61402234, the National Basic Research Program 973 under Grant No. 2011CB311808, the Natural Science Foundation of Jiangsu province under Grant No. BK2012461, the research fund from Jiangsu Technology & Engineering Center of Meteorological Sensor Network in NUIST under Grant No. KDXG1301, the research fund from Jiangsu Engineering Center of Network Monitoring in NUIST under Grant No. KJR1302, the research fund from Nanjing University of Information Science and Technology under Grant No. S8113003001, the 2013 Nanjing Project of Science and Technology Activities for Returning from Overseas, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Shen, J., Shen, J., Li, X., Wei, F., Li, J. (2016). Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-48671-0_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48670-3
Online ISBN: 978-3-319-48671-0
eBook Packages: Computer ScienceComputer Science (R0)