Abstract
To guarantee the integrity of cloud data, plenty of cloud storage auditing schemes are proposed. In cloud storage, when a company is purchased by another company, the corresponding data of the acquired company will be transferred to the acquiring company. In addition, there may be duplicate files between the acquiring company and the acquired company. To solve the above problems, we propose a secure cloud storage auditing scheme with deduplication and efficient data transfer. We design a novel signature transformation method, in which the signatures of the acquired company can be efficiently transformed into the signatures of the acquiring company with the assistance of the cloud. Using the above method, the acquiring company does not require to recompute the data signatures for the transferred data when cloud data is transferred. Furthermore, to improve the efficiency of cloud storage, we use data deduplication method, in which the cloud stores only a single copy of the duplicate files. The security proof and performance analysis show that the proposed scheme is secure and efficient.
Similar content being viewed by others
Data availability
Enquiries about data availability should be directed to the authors.
References
Kan, G., Jin, C., Zhu, H., Xu, Y., Liu, N.: An identity-based proxy re-encryption for data deduplication in cloud. J. Syst. Archit. 121, 102332 (2021)
Su, Y., Li, Y., Yang, B., Ding, Y.: Decentralized self-auditing scheme with errors localization for multi-cloud storage. IEEE Trans. Depend. Secure. Comput. 19(4), 2838–2850 (2021)
Yang, Y., Chen, Y., Chen, F.: A compressive integrity auditing protocol for secure cloud storage. IEEE/ACM Trans. Netw. 29(3), 1197–1209 (2021)
Shen, W., Yu, J., Xia, H., Zhang, H., Lu, X., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)
Li, S., Xu, C., Zhang, Y., Du, Y., Chen, K.: Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Trans. Serv. Comput. 16(1), 134–136 (2022)
Li, T., Wang, H., He, D., Yu, J.: Synchronized provable data possession based on blockchain for digital twin. IEEE Trans. Inf. Forensics Secur. 17, 472–485 (2022)
Shen, W., Yu, J., Yang, M., Hu, J.: Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage. IEEE Trans. Dependable Secure Comput. 1–15 (2022). https://doi.org/10.1109/TDSC.2022.3228699
Du, Y., Duan, H., Zhou, A., Wang, C., Au, M.H., Wang, Q.: Enabling secure and efficient decentralized storage auditing with blockchain. IEEE Trans. Depend. Secure Comput. 19(5), 3038–3054 (2021)
Shu, J., Zou, X., Jia, X., Zhang, W., Xie, R.: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. Cloud Comput. 10(4), 2366–2380 (2022)
Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans. Dependable Secure Comput. 17(3), 608–619 (2018)
Wang, H., He, D., Fu, A., Li, Q., Wang, Q.: Provable data possession with outsourced data transfer. IEEE Trans. Serv. Comput. 14(6), 1929–1939 (2019)
Shen, W., Qin, J., Yu, J., Hao, R., Hu, J.: Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 14(2), 331–346 (2018)
Tian, H., Chen, Y., Chang, C.-C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2015)
Liu, Z., Ren, L., Li, R., Liu, Q., Zhao, Y.: Id-based sanitizable signature data integrity auditing scheme with privacy-preserving. Comput. Secur. 121, 102858 (2022)
Yang, C., Zhao, F., Tao, X., Wang, Y.: Publicly verifiable outsourced data migration scheme supporting efficient integrity checking. J. Netw. Comput. Appl. 192, 103184 (2021)
Md, Abdul Quadir, Varadarajan, Vijayakumar, Mandal, Karan: Efficient algorithm for identification and cache based discovery of cloud services. Mobile Netw. Appl. 24, 1181–1197 (2019)
Quadir, Md Abdul, Christy Jackson, J., Prassanna, J., Sathyarajasekaran, K., Kumar, K., Sabireen, H., Ubarhande, Shivam, Vijaya Kumar, V.: An efficient algorithm to detect DDoS amplification attacks. J. Intell. Fuzzy Syst. 39(6), 8565–8572 (2020)
Sabireen, H., Venkataraman, Neelanarayanan: A hybrid and light weight metaheuristic approach with clustering for multi-objective resource scheduling and application placement in fog environment. Expert Syst. Appl. 223, 119895 (2023)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: International conference on the theory and application of cryptology and information security, pp. 90–107. Springer (2008)
Jin, H., Jiang, H., Zhou, K.: Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans. Cloud Comput. 6(3), 680–693 (2016)
Shen, J., Shen, J., Chen, X., Huang, X., Susilo, W.: An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensics Secur. 12(10), 2402–2415 (2017)
Rao, L., Zhang, H., Tu, T.: Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree. IEEE Trans. Serv. Comput. 13(3), 451–463 (2017)
Xu, Z., He, D., Vijayakumar, P., Gupta, B., Shen, J.: Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted medical wsns. IEEE Journal of Biomedical and Health Informatics (2021)
Shao, B., Bian, G., Wang, Y., Su, S., Guo, C.: Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access 6, 43785–43797 (2018)
Li, Z., Li, Y., Yang, B., Ding, Y.: Algebraic Signature-Based Public Data Integrity Batch Verification for Cloud-IoT. IEEE Trans. Cloud Comput. 1–12 (2023). https://doi.org/10.1109/TCC.2023.3266593
Xu, Y., Ding, L., Cui, J., Zhong, H., Yu, J.: Pp-csa: a privacy-preserving cloud storage auditing scheme for data sharing. IEEE Syst. J. 15(3), 3730–3739 (2020)
Su, Y., Li, Y., Zhang, K., Yang, B.: A privacy-preserving public integrity check scheme for outsourced ehrs. Inf. Sci. 542, 112–130 (2021)
Xu, Y., Sun, S., Cui, J., Zhong, H.: Intrusion-resilient public cloud auditing scheme with authenticator update. Inf. Sci. 512, 616–628 (2020)
Zhao, J., Huang, H., Gu, C., Hua, Z., Zhang, X.: Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism. IEEE Syst. J. 16(3), 4477–4488 (2021)
Li, B., He, Q., Chen, F., Jin, H., Xiang, Y., Yang, Y.: Inspecting edge data integrity with aggregated signature in distributed edge computing environment. IEEE Trans. Cloud Comput. 10(4), 2691–2703 (2021)
Tian, Miao, Zhang, Yushu, Zhu, Youwen, Wang, Liangmin, Xiang, Yong: DIVRS: Data integrity verification based on ring signature in cloud storage. Comput. Secur. 124, 103002 (2023)
Wang, H., He, D., Yu, J., Xiong, N.N., Wu, B.: Rdic: a blockchain-based remote data integrity checking scheme for iot in 5g networks. J. Parallel Distrib. Comput. 152, 1–10 (2021)
Li, Tengfei, Chu, Jianfeng, Hu, Liang: CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers. IEEE Trans. Parallel Distrib. Syst. 34(1), 154–162 (2022)
Zheng, W., Lai, C.-F., He, D., Kumar, N., Chen, B.: Secure storage auditing with efficient key updates for cognitive industrial iot environment. IEEE Trans. Industr. Inf. 17(6), 4238–4247 (2020)
Li, C., Liu, Z.: A secure privacy-preserving cloud auditing scheme with data deduplication. Int. J. Netw. Secur. 21(2), 199–210 (2019)
Liu, X., Sun, W., Lou, W., Pei, Q., Zhang, Y.: One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications. IEEE, pp. 1–9 (2017)
Xu, Y., Zhang, C., Wang, G., Qin, Z., Zeng, Q.: A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans. Emerg. Top. Comput. 9(3), 1421–1432 (2020)
Dang, Q., Ma, H., Liu, Z., Xie, Y.: Secure and efficient client-side data deduplication with public auditing in cloud storage. Int. J. Netw. Secur. 22(3), 460–473 (2020)
Shen, W., Su, Y., Hao, R.: Lightweight cloud storage auditing with deduplication supporting strong privacy protection. IEEE Access 8, 44359–44372 (2020)
Li, J., Li, J., Xie, D., Cai, Z.: Secure auditing and deduplicating data in cloud. IEEE Trans. Comput. 65(8), 2386–2396 (2015)
Tian, G., Hu, Y., Wei, J., Liu, Z., Huang, X., Chen, X., Susilo, W.: Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans. Dependable Secure Comput. 19(6), 3941–3954 (2021)
“The gnu multiple precision arithmetic library (gmp)". https://gmplib.org/
Lynn, B.: “The pairing-based cryptographic library". https://gmplib.org/
Funding
This work is supported by National Natural Science Foundation of China (62102211) and Shandong Provincial Natural Science Foundation (ZR2021QF018).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have not disclosed any competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Yu, J., Shen, W. Secure cloud storage auditing with deduplication and efficient data transfer. Cluster Comput 27, 2203–2215 (2024). https://doi.org/10.1007/s10586-023-04072-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-023-04072-0