Skip to main content

Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing

  • Conference paper
  • First Online:
  • 1411 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10039))

Abstract

The rapid development of cloud storage in these years has caused a wave of research craze. To improve the cloud user experience, a large amount of schemes are proposed with various practical performances, for instance, long term correct data storage and dynamic data modification. In most works, however, the authors seem to completely ignore the hard fact that data owner alone could not have enough energy to discover and correct all the inappropriate data outsourced in cloud. Others did consider it, and gave more than one user both read and write permissions, which leads to chaotic management of multiusers. In this paper, we propose a novel algorithm, in which the data owner and several authenticated assistants form a team to support dynamic data modification together. Assistants are in charge of detecting problems in cloud data and discussing a corresponding modification suggestion, while data owner is responsible for the implementation of the modification. In addition, our algorithm supports identity authentication, efficient malicious assistant revocation, as well as lazy update. Sufficient numerical analysis validates the performance of our algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 50 (2011)

    Google Scholar 

  2. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(15), 843–859 (2013)

    Article  Google Scholar 

  3. Dudin, E.B., Smetanin, Y.G.: A review of cloud computing. Sci. Tech. Inf. Process. 38(38), 280–284 (2011)

    Article  Google Scholar 

  4. Zeng, W., Zhao, Y., Ou, K., Song, W.: Research on cloud storage architecture and key technologies. In: Proceedings of the International Conference on Interaction Sciences: Information Technology, Culture and Human 2009, Seoul, Korea, 24–26 November, pp. 1044–1048 (2009)

    Google Scholar 

  5. Wang, Q., He, M., Du, M., Chow, S.S.M., Lai, R.W.F., Zou, Q.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016). doi:10.1109/TDSC.2016.25934446

    Google Scholar 

  6. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  7. Velte, T., Velte, A., Elsenpeter, R.: Cloud Computing, A Practical Approach. McGraw-Hill, New York (2009)

    Google Scholar 

  8. Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web-Internet Web Inf. Syst. 15(4), 409–428 (2011)

    Article  Google Scholar 

  9. Xiao, Z., Xiao, Y., Chen, H.: An accountable framework for sensing-oriented mobile cloud computing. J. Internet Technol. 15(5), 813–822 (2014)

    Google Scholar 

  10. He, D., Zeadally, S., Kumar, N., Lee, J.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. PP(99), 1–12 (2016)

    Google Scholar 

  11. Zhang, Q., Chen, Z., Len, Y.: Distributed fuzzy c-means algorithms for big sensor data based on cloud computing. Int. J. Sens. Netw. 18(1/2), 32–39 (2015)

    Article  Google Scholar 

  12. Ren, Y., Shen, J., Wang, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)

    Google Scholar 

  13. Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the IEEE International Conference on Computer Communication, pp. 2121–2129 (2014)

    Google Scholar 

  14. Rakesh, J., Krishna, J.V.: A novel approach for secure data sharing in multi-owner groups in cloud. Int. J. Comput. Trends Technol. 16(1), 20–23 (2014)

    Google Scholar 

  15. He, D., Zeadally, S.: Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1), 71–77 (2015)

    Article  Google Scholar 

  16. Baskar, H.: Fully secure and efficient data sharing with attribute revocation for multi-owner cloud storage. Int. J. Adv. Res. Educ. Technol. 3(2), 835–838 (2015)

    Google Scholar 

  17. Wang, B., Li, H., Liu, X., Li, X., Li, F.: Preserving identity privacy on multi-owner cloud data during public verification. Secur. Commun. Netw. 7(11), 2104–2113 (2013)

    Article  Google Scholar 

  18. Suba, J.: Multi owner data sharing with privacy preserving in cloud security mediator. Int. J. Sci. Res. 3(3), 41–44 (2014)

    Google Scholar 

  19. Tasmiya, S.K., Kausar, F.: An efficient approach to share data in cloud with multi-owner groups. Int. J. Comput. Technol. 1(3), 137–141 (2014)

    Google Scholar 

  20. Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 320–333 (2011)

    Article  Google Scholar 

  21. Sun, D., Chang, G., Miao, C., Wang, X.: Modelling and evaluating a high serviceability fault tolerance strategy in cloud computing environments. Int. J. Secur. Netw. 7(4), 196–210 (2012)

    Article  Google Scholar 

  22. Femilshini, F., Ganeshkarthikeyan, V., Janani, S.: Privacy preserving revocation update protocol for group signature in cloud. In: Proceedings of the IEEE International Conference on Engineering and Technology, pp. 1–5. IEEE (2015)

    Google Scholar 

  23. Zagade, P., Yadav, S., Shah, A., Bachate, R.: Group user revocation and integrity auditing of shared data in cloud environment. Int. J. Comput. Appl. 128(12), 22–25 (2015)

    Google Scholar 

  24. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)

    Article  Google Scholar 

  25. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  26. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  27. Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 295–302 (2012)

    Google Scholar 

  28. Wang, B., Li, B., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. In: Proceedings of the 32nd IEEE International Conference on Computer Communication, Turin, Italy, pp. 2904–2912 (2013)

    Google Scholar 

  29. Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multi-user modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1 (2015)

    Article  Google Scholar 

  30. Green, M.: The threat in the cloud. IEEE Secur. Priv. 11(1), 86–89 (2013)

    Article  Google Scholar 

  31. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2506573

    Google Scholar 

  32. Hu, S., Wang, Q., Wang, J., Qin, Z., Ren, K.: Securing SIFT: privacy-preserving outsourcing computation of feature extractions over encrypted image data. IEEE Trans. Image Process. 25(7), 3411–3425 (2016)

    Article  MathSciNet  Google Scholar 

  33. He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. PP(99), 1–10 (2015)

    Article  Google Scholar 

  34. Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171–178 (2015)

    Google Scholar 

  35. Santos, D., Nascimento, T., Westphall, C., Leandro, M., Westphall, C.: Privacy-preserving identity federations in the cloud: a proof of concept. Int. J. Secur. Netw. 9(1), 1–11 (2014)

    Article  Google Scholar 

  36. Khorshed, M.T., Ali, A.B.M.S., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)

    Article  Google Scholar 

  37. Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V., Freire, M.M., Incio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13(2), 113–170 (2014)

    Article  Google Scholar 

  38. Soares, L.F.B., Fernandes, D.A.B., Gomes, J.V., Freire, M.M., Incio, P.R.: Cloud Security: State of the Art, Security, Privacy and Trust in Cloud Systems, pp. 3–44. Springer, Heidelberg (2014)

    Book  Google Scholar 

  39. Chraibi, M., Harroud, H., Maach, A.: Classification of security issues and solutions in cloud environments. In: Proceedings of the International Conference on Information Integration and Web-Based Applications & Services. ACM (2013)

    Google Scholar 

  40. Chen, Y., Paxson, V., Katz, R.H.: What’s new about cloud computing security. Univ. Calif. Berkeley Rep. 20(2010), 2010–2015 (2010)

    Google Scholar 

  41. Ju, H.: Intelligent disaster recovery structure and mechanism for cloud computing network. Int. J. Sens. Netw. 16(2), 70–76 (2014)

    Article  MathSciNet  Google Scholar 

  42. Barua, M., Liang, X., Lu, R., Shen, X.: ESPAC: enabling security and patient-centric access control for eHealth in cloud computing. Int. J. Secur. Netw. 6(2/3), 67–76 (2011)

    Article  Google Scholar 

  43. Boampong, P.A., Wahsheh, L.A.: Different facets of security in the cloud. In: Proceedings of the 15th Communications and Networking Simulation Symposium. Society for Computer Simulation International (2012)

    Google Scholar 

  44. Shen, J., Moh, S., Chung, I.: Identity-based key agreement protocol employing a symmetric balanced incomplete block design. J. Commun. Netw. 14(14), 682–691 (2012)

    Article  Google Scholar 

  45. Xiao, Z., Xiao, Y.: Achieving accountable MapReduce in cloud computing. Future Gener. Comput. Syst. 30(1), 1–13 (2014). (Elsevier)

    Article  Google Scholar 

  46. Lawal, B.: Incomplete block design. In: Lawal, B. (ed.) Applied Statistical Methods in Agriculture, Health and Life Sciences, pp. 639–659. Springer International Publishing, Heidelberg (2014)

    Chapter  Google Scholar 

  47. Lee, O., Yoo, S., Park, B., Chung, I.: The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design. Inf. Sci. 176(15), 2148–2160 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  48. Shen, J., Moh, S., Chung, I.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453–462 (2015)

    Article  Google Scholar 

  49. Xiao, Z., Xiao, Y.: Accountable MapReduce in cloud computing. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1082–1087 (2011)

    Google Scholar 

  50. Mbegbu, J.I.: Some designs from symmetric balanced incomplete block design. J. Niger. Assoc. Math. Phy. 17, 363–366 (2013)

    Google Scholar 

  51. Shen, J., Zheng, W., Wang, J., Zheng, Y., Sun, X.: An efficient verifiably encrypted signature from Weil pairing. J. Internet Technol. 14(6), 682–691 (2012)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Science Foundation of China under Grant No. 61300237, No. U1536206, No. U1405254, No. 61232016 and No. 61402234, the National Basic Research Program 973 under Grant No. 2011CB311808, the Natural Science Foundation of Jiangsu province under Grant No. BK2012461, the research fund from Jiangsu Technology & Engineering Center of Meteorological Sensor Network in NUIST under Grant No. KDXG1301, the research fund from Jiangsu Engineering Center of Network Monitoring in NUIST under Grant No. KJR1302, the research fund from Nanjing University of Information Science and Technology under Grant No. S8113003001, the 2013 Nanjing Project of Science and Technology Activities for Returning from Overseas, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund, and the PAPD fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Shen, J., Shen, J., Li, X., Wei, F., Li, J. (2016). Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing. In: Sun, X., Liu, A., Chao, HC., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2016. Lecture Notes in Computer Science(), vol 10039. Springer, Cham. https://doi.org/10.1007/978-3-319-48671-0_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48671-0_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48670-3

  • Online ISBN: 978-3-319-48671-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics