Skip to main content

An Improved Privacy-Preserving Public Auditing for Secure Cloud Storage

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 436))

Abstract

Distributed computing or Cloud Computing could be a net fundamentally based rising and rapidly developing model. Inside which client will store their insight remotely and revel in the on-interest top quality applications and administrations from a mutual pool of configurable processing assets, while not the weight of local source and upkeep. Hence, accuracy and security of information could be a prime concern. Physical ownership of the outsourced information is limited to clients. Making certain trustworthiness could be a troublesome undertaking, especially for clients with confined figuring assets. Additionally, client should be prepared to utilize the distributed storage on the grounds that it is local stockpiling, without apprehension concerning the wish to review its honesty. In this way, allowing public auditability for conveyed stockpiling is of basic hugeness; so, cloud tenants or cloud users will use a third party auditor (TPA) to envision the uprightness of saved data and be clear. To solidly present a decent outsider evaluator, the inspecting strategy should usher in no new vulnerabilities toward client learning protection, and present no further online weight to client.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wang, C.: Privacy-preserving public auditing for storage security in cloud computing. In: Proceedings IEEE INFOCOM 10, March 2010

    Google Scholar 

  2. Mell, P., Grance, T.: Draft NIST Working Definition of Cloud Computing (2009)

    Google Scholar 

  3. Pearson, S.: Privacy, security and trust in cloud computing. In: Privacy and Security for Cloud Computing (2012)

    Google Scholar 

  4. Cloud Security Alliance: Top Threats to Cloud Computing

    Google Scholar 

  5. Juels, A., Burton, J., Kaliski, S.: PORs: proofs of retrievability for large files. In: Proceedings ACM Conference Computer and Communication Security (CCS ’07), pp. 584–597, Oct. 2007

    Google Scholar 

  6. Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. Proc. Theory Cryptograph. Conf. Theor. Cryptograph. (TCC), pp. 109–127 (2009)

    Google Scholar 

  7. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings International Conferrence Theory and Application of Cryptography and Information Security: Advances in Cryptography (Asiacrypt), vol. 5350, pp. 90–107, Dec 2008

    Google Scholar 

  8. Marium, S., Nazir, Q., Ahmed, A., Ahthasham, S., Mirza, A.M.: Implementation of EAP with RSA for enhancing the security of cloud computing

    Google Scholar 

  9. Kiran Kumar, K., Padmaja, K., Radha Krishna, P.: Automatic protocol blocker for privacy-preserving public auditing in cloud computing. Int. J. Comput. Sci. Technol. 3, pp. 936–940. ISSN. 0976-8491 (Online). ISSN: 2229-4333 (Print), March 2012

    Google Scholar 

  10. Cong, W., Sherman S.-M., Chow, Q.W., Kui, R., Wenjing, L.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput 62(2), 2013

    Google Scholar 

  11. Shrinivas, D.: Privacy-preserving public auditing in cloud storage security. Int. J. Comput. Sci. Inf. Technol. 2(6), 2691–2693. ISSN: 0975-9646 (2011)

    Google Scholar 

  12. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security (CCS’07), pp. 598–609. ACM (2007)

    Google Scholar 

  13. Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), pp. 213–222. ACM (2009)

    Google Scholar 

  14. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Google Scholar 

  15. Zhu, Y., Hu, H., Ahn, G., Yu, M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12) 2231–2244 (2012)

    Google Scholar 

  16. Zhu, Y., Wang, H., Hu, Z., Ahn, G.J., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storages in clouds. In: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC’11), pp. 1550–1557. ACM (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajeev Arya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Kulkarni, M.N., Tidke, B.A., Rajeev Arya (2016). An Improved Privacy-Preserving Public Auditing for Secure Cloud Storage. In: Pant, M., Deep, K., Bansal, J., Nagar, A., Das, K. (eds) Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 436. Springer, Singapore. https://doi.org/10.1007/978-981-10-0448-3_71

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0448-3_71

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0447-6

  • Online ISBN: 978-981-10-0448-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics