Abstract
Public auditing is an important issue in cloud storage service because a cloud service provider may try to hide management mistakes and system errors from users or even steal or tamper with a user’s data for monetary reasons. Without the protection of a proper auditing mechanism, cloud users would have to run high risks of having their legal rights and interests spoiled without their knowledge. Therefore, many data integrity, assurance, and correctness schemes have been proposed for data auditing. Most of these schemes work by randomly sampling and aggregating signatures from bilinear maps (for more efficiency) to check whether the cloud storage service is honest and whether the data stored in the cloud is correct. Although aggregating signatures can reduce the auditor’s computing overhead and time, unfortunately, none of these schemes have offered any workable solution to giving detailed information on where the errors are when the cloud data as a whole fails the auditing. To fix this problem, we shall propose a new public auditing scheme with a mechanism integrated into it especially to locate the problematic data blocks when they exist. With efficiency, the proposed scheme is capable not only of giving an accurate pass/fail report but also providing detailed information on the locations of the errors detected.





Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Ateniese, G., Kevin, F.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, pp. 598–610, October (2007)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, pp. 514–532, December (2001)
Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms’. Int. J. Netw. Secur. 10(3), 216–222 (2010)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect. Notes Comput. Sci. 3156, 119–132 (2004)
Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15(4), 231–240 (2013)
Li, C.-T., Hwang, M.-S.: A batch verifying and detecting the illegal signatures. Int. J. Innov. Comput. Inf. Control 6(12), 5311–5320 (2010)
Liu, Q., Wang, G., Wu, J.: Efficient sharing of secure cloud storage services. In: Proceeding of the 10th IEEE International Conference on Computer and Information Technology (CIT 2010), Bradford, USA, pp. 922–929, June (2010)
Liu, H., Zhang, P., Liu, J.: Public data integrity verification for secure cloud storage. J. Netw. 8(2), 373–380 (2013)
Rajathi, A., Saravanan, N.: A survey on secure storage in cloud computing. Indian J. Sci. Technol. 6(4), 4396–4401 (2013)
Rifa-Pous, H., Herrera-Joancomarti, J.: Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 3(1), 31–48 (2011)
Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: Proceeding of the 4th International Conference on Internet Multimedia Systems Architecture and Applications (IMSAA-10), Bangalore, India, pp. 1–6, December (2009)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security–ASIACRYPT 2008, Melbourne, Australia, p. 90V107, December (2008)
Shucheng, Y., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data dccess control in cloud computing. In: Proceeding of the 29th IEEE INFOCOM 2010, San Diego, CA, pp. 1–9, March (2010)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
Sun, T.H.: A study of key management and data auditing in cloud storage service. Master’s Thesis of National Chung Hsing University, Taichung, Taiwan, pp. 1–65 (2012)
Syam Kumar, P., Subramanian, R.: RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence. Int. J. Cloud Comput. 1(2), 167–200 (2012)
Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors. Lect. Notes Comput. Sci. 4307, 519–528 (2006)
Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceeding of the 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, IL, pp. 735–737, October (2010a)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceeding of the 29th IEEE INFOCOM 2010, San Diego, CA, pp. 1–9 March (2010b)
Wang, G., Liu, Q., Jie, W., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 311–320 (2011a)
Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 4(4), 1–14 (2011b)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011c)
Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)
Zhu, Y., Hongxin, H.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5), 1083–1095 (2012)
Acknowledgments
The authors would like to express their appreciation to the anonymous referees for their valuable suggestions and comments. This research was partially supported by the National Science Council, Taiwan, ROC, under Contract No. NSC102-2221-E-030-003.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hwang, MS., Lee, CC. & Sun, TH. Data error locations reported by public auditing in cloud storage service. Autom Softw Eng 21, 373–390 (2014). https://doi.org/10.1007/s10515-014-0142-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10515-014-0142-6