Skip to main content
Log in

Secure cloud storage auditing with deduplication and efficient data transfer

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

To guarantee the integrity of cloud data, plenty of cloud storage auditing schemes are proposed. In cloud storage, when a company is purchased by another company, the corresponding data of the acquired company will be transferred to the acquiring company. In addition, there may be duplicate files between the acquiring company and the acquired company. To solve the above problems, we propose a secure cloud storage auditing scheme with deduplication and efficient data transfer. We design a novel signature transformation method, in which the signatures of the acquired company can be efficiently transformed into the signatures of the acquiring company with the assistance of the cloud. Using the above method, the acquiring company does not require to recompute the data signatures for the transferred data when cloud data is transferred. Furthermore, to improve the efficiency of cloud storage, we use data deduplication method, in which the cloud stores only a single copy of the duplicate files. The security proof and performance analysis show that the proposed scheme is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  1. Kan, G., Jin, C., Zhu, H., Xu, Y., Liu, N.: An identity-based proxy re-encryption for data deduplication in cloud. J. Syst. Archit. 121, 102332 (2021)

    Article  Google Scholar 

  2. Su, Y., Li, Y., Yang, B., Ding, Y.: Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Trans. Depend. Secure. Comput. 19(4), 2838–2850 (2021)

    Article  Google Scholar 

  3. Yang, Y., Chen, Y., Chen, F.: A compressive integrity auditing protocol for secure cloud storage. IEEE/ACM Trans. Netw. 29(3), 1197–1209 (2021)

    Article  Google Scholar 

  4. Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)

    Article  Google Scholar 

  5. Li, S., Xu, C., Zhang, Y., Du, Y., Chen, K.: Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Trans. Serv. Comput. 16(1), 134–136 (2022)

    Google Scholar 

  6. Li, T., Wang, H., He, D., Yu, J.: Synchronized provable data possession based on blockchain for digital twin. IEEE Trans. Inf. Forensics Secur. 17, 472–485 (2022)

    Article  Google Scholar 

  7. Shen, W., Yu, J., Yang, M., Hu, J.: Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage. IEEE Trans. Dependable Secure Comput. 1–15 (2022). https://doi.org/10.1109/TDSC.2022.3228699

  8. Du, Y., Duan, H., Zhou, A., Wang, C., Au, M.H., Wang, Q.: Enabling secure and efficient decentralized storage auditing with blockchain. IEEE Trans. Depend. Secure Comput. 19(5), 3038–3054 (2021)

    Article  Google Scholar 

  9. Shu, J., Zou, X., Jia, X., Zhang, W., Xie, R.: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. Cloud Comput. 10(4), 2366–2380 (2022)

    Article  Google Scholar 

  10. Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secure Comput. 17(3), 608–619 (2018)

    Google Scholar 

  11. Wang, H., He, D., Fu, A., Li, Q., Wang, Q.: Provable data possession with outsourced data transfer. IEEE Trans. Serv. Comput. 14(6), 1929–1939 (2019)

    Article  Google Scholar 

  12. Shen, W., Qin, J., Yu, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2018)

    Article  Google Scholar 

  13. Tian, H., Chen, Y., Chang, C.-C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2015)

    Article  Google Scholar 

  14. Liu, Z., Ren, L., Li, R., Liu, Q., Zhao, Y.: Id-based sanitizable signature data integrity auditing scheme with privacy-preserving. Comput. Secur. 121, 102858 (2022)

    Article  Google Scholar 

  15. Yang, C., Zhao, F., Tao, X., Wang, Y.: Publicly verifiable outsourced data migration scheme supporting efficient integrity checking. J. Netw. Comput. Appl. 192, 103184 (2021)

    Article  Google Scholar 

  16. Md, Abdul Quadir, Varadarajan, Vijayakumar, Mandal, Karan: Efficient algorithm for identification and cache based discovery of cloud services. Mobile Netw. Appl. 24, 1181–1197 (2019)

    Article  Google Scholar 

  17. Quadir, Md Abdul, Christy Jackson, J., Prassanna, J., Sathyarajasekaran, K., Kumar, K., Sabireen, H., Ubarhande, Shivam, Vijaya Kumar, V.: An efficient algorithm to detect DDoS amplification attacks. J. Intell. Fuzzy Syst. 39(6), 8565–8572 (2020)

    Article  Google Scholar 

  18. Sabireen, H., Venkataraman, Neelanarayanan: A hybrid and light weight metaheuristic approach with clustering for multi-objective resource scheduling and application placement in fog environment. Expert Syst. Appl. 223, 119895 (2023)

    Article  Google Scholar 

  19. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

  20. Shacham, H., Waters, B.: Compact proofs of retrievability. In: International conference on the theory and application of cryptology and information security, pp. 90–107. Springer (2008)

  21. Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 6(3), 680–693 (2016)

    Article  Google Scholar 

  22. Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)

    Article  Google Scholar 

  23. Rao, L., Zhang, H., Tu, T.: Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree. IEEE Trans. Serv. Comput. 13(3), 451–463 (2017)

    Article  Google Scholar 

  24. Xu, Z., He, D., Vijayakumar, P., Gupta, B., Shen, J.: Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical wsns. IEEE Journal of Biomedical and Health Informatics (2021)

  25. Shao, B., Bian, G., Wang, Y., Su, S., Guo, C.: Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access 6, 43785–43797 (2018)

    Article  Google Scholar 

  26. Li, Z., Li, Y., Yang, B., Ding, Y.: Algebraic Signature-Based Public Data Integrity Batch Verification for Cloud-IoT. IEEE Trans. Cloud Comput. 1–12 (2023). https://doi.org/10.1109/TCC.2023.3266593

  27. Xu, Y., Ding, L., Cui, J., Zhong, H., Yu, J.: Pp-csa: a privacy-preserving cloud storage auditing scheme for data sharing. IEEE Syst. J. 15(3), 3730–3739 (2020)

    Article  Google Scholar 

  28. Su, Y., Li, Y., Zhang, K., Yang, B.: A privacy-preserving public integrity check scheme for outsourced ehrs. Inf. Sci. 542, 112–130 (2021)

    Article  MathSciNet  Google Scholar 

  29. Xu, Y., Sun, S., Cui, J., Zhong, H.: Intrusion-resilient public cloud auditing scheme with authenticator update. Inf. Sci. 512, 616–628 (2020)

    Article  MathSciNet  Google Scholar 

  30. Zhao, J., Huang, H., Gu, C., Hua, Z., Zhang, X.: Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism. IEEE Syst. J. 16(3), 4477–4488 (2021)

    Article  Google Scholar 

  31. Li, B., He, Q., Chen, F., Jin, H., Xiang, Y., Yang, Y.: Inspecting edge data integrity with aggregated signature in distributed edge computing environment. IEEE Trans. Cloud Comput. 10(4), 2691–2703 (2021)

    Article  Google Scholar 

  32. Tian, Miao, Zhang, Yushu, Zhu, Youwen, Wang, Liangmin, Xiang, Yong: DIVRS: Data integrity verification based on ring signature in cloud storage. Comput. Secur. 124, 103002 (2023)

    Article  Google Scholar 

  33. Wang, H., He, D., Yu, J., Xiong, N.N., Wu, B.: Rdic: a blockchain-based remote data integrity checking scheme for iot in 5g networks. J. Parallel Distrib. Comput. 152, 1–10 (2021)

    Article  Google Scholar 

  34. Li, Tengfei, Chu, Jianfeng, Hu, Liang: CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers. IEEE Trans. Parallel Distrib. Syst. 34(1), 154–162 (2022)

    Article  Google Scholar 

  35. Zheng, W., Lai, C.-F., He, D., Kumar, N., Chen, B.: Secure storage auditing with efficient key updates for cognitive industrial iot environment. IEEE Trans. Industr. Inf. 17(6), 4238–4247 (2020)

    Article  Google Scholar 

  36. Li, C., Liu, Z.: A secure privacy-preserving cloud auditing scheme with data deduplication. Int. J. Netw. Secur. 21(2), 199–210 (2019)

    Google Scholar 

  37. Liu, X., Sun, W., Lou, W., Pei, Q., Zhang, Y.: One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, pp. 1–9 (2017)

  38. Xu, Y., Zhang, C., Wang, G., Qin, Z., Zeng, Q.: A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans. Emerg. Top. Comput. 9(3), 1421–1432 (2020)

    Article  Google Scholar 

  39. Dang, Q., Ma, H., Liu, Z., Xie, Y.: Secure and efficient client-side data deduplication with public auditing in cloud storage. Int. J. Netw. Secur. 22(3), 460–473 (2020)

    Google Scholar 

  40. Shen, W., Su, Y., Hao, R.: Lightweight cloud storage auditing with deduplication supporting strong privacy protection. IEEE Access 8, 44359–44372 (2020)

    Article  Google Scholar 

  41. Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2015)

    Article  MathSciNet  Google Scholar 

  42. Tian, G., Hu, Y., Wei, J., Liu, Z., Huang, X., Chen, X., Susilo, W.: Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans. Dependable Secure Comput. 19(6), 3941–3954 (2021)

    Article  Google Scholar 

  43. “The gnu multiple precision arithmetic library (gmp)". https://gmplib.org/

  44. Lynn, B.: “The pairing-based cryptographic library". https://gmplib.org/

Download references

Funding

This work is supported by National Natural Science Foundation of China (62102211) and Shandong Provincial Natural Science Foundation (ZR2021QF018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenting Shen.

Ethics declarations

Conflict of interest

The authors have not disclosed any competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, J., Shen, W. Secure cloud storage auditing with deduplication and efficient data transfer. Cluster Comput 27, 2203–2215 (2024). https://doi.org/10.1007/s10586-023-04072-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-04072-0

Keywords

Navigation