Abstract
Nowadays, as distance learning is being widly used, multimedia data becomes an effective way for delivering educational contents in online educational systems. To handle the educational multimedia data efficiently, many distance learning systems adopt a cloud storage service. Cloud computing and storage services provide a secure and reliable access to the outsourced educational multimedia contents for users. However, it brings challenging security issues in terms of data confidentiality and integrity. The straightforward way for the integrity check is to make the user download the entire data for verifying them. But, it is inefficient due to the large size of educational multimedia data in the cloud. Recently many integrity auditing protocols have been proposed, but most of them do not consider the data privacy for the cloud service provider. Additionally, the previous schemes suffer from dynamic management of outsourced data. In this paper, we propose a public auditing protocol for educational multimedia data outsourced in the cloud storage. By using random values and a homomorphic hash function, our proposed protocol ensures data privacy for the cloud and the third party auditor (TPA). Also, it is secure against lose attack and temper attack. Moreover, our protocol is able to support fully dynamic auditing. Security and performance analysis results show that the proposed scheme is secure while guaranteeing minimum extra computation costs.




Similar content being viewed by others
References
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of ACM CCS, pp 598–610
Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of SecureComm, pp 1-10
Bao F, Deng R, Zhu H (2003) Variations of Diffie-Hellman problem. Inf Commun SecurityICICS:301–312
Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing, ASIACRYPT 2001. LNCS 2248:514–532
Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of CCS, pp 213-222
Gennaro R, Katz J, Krawczyk H, Rabin T (2010) Secure network coding over the integers. Public key cryptography pkc, Springer LNCS, 6056, pp 142–160
Govinda Y, Vijaya G (2013) Complete privacy preserving auditing for data integrity in cloud computing. IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp 1559–1566
Juels A, Kaliski BS (2007) PORs: proofs pf retrievability for large files. In: Proceedings of ACM CCS, pp 584–597
Krohn M, Freeman M, Mazieres D (2004) On-the-fly verification of rateless erase codes for efficient content distribution. In: Proc. IEEE symposium on security and privacy
Li J Study on the development of mobile learning promoted by cloud computing (2010) information engineering and computer science (ICIECS). Second international conference, pp 1-4
Liu H, Zhang P, Liu J (2013) Public data integrity verification for secure cloud storage. J Netw:373–380
Masud M, Huang X (2012) A novel approach for adopting cloud-based e-learning system. In: IEEE/ACIS 11th international conference on computer and information science (ICIS), pp 37–42
Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proc. ASIACRYPT. Springer-Verlag, pp 90–107
Wang C, Wang Q, Ren K, Lou W (2010) Privacy preserving public auditing for data storage security in cloud computing. IEEE InfoCom:1–9
Wang Q, Wang C, Ren K, Lou W (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst:847–859
Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726
Yu H, Pedrinaci C, Dietze S, Domingue J (2012) Using linked data to annotate search educational video resources for supporting distance learning. IEEE Trans Learn Technologies:130–142
Zeng K (2008) Publicly verifiable remote data integrity. In: Proceedings of the international conference on information and communications security, ICICS, pp 419–434
Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2010) Efficient provable data possession for hybrid clouds. In: Proceedings of the 17th ACM conference on computer and communications security, pp 756–758
Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2011) Dynamic audit services for integrity verification of outsourced storage in clouds. In: the proceedings of ACM SAC, pp 1550–1557
Acknowledgments
This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2013R1A2A2A01005559). This research was supported by the Chung-Ang University Research Scholarship Grants in 2014.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, D., Kwon, H., Hahn, C. et al. Privacy-preserving public auditing for educational multimedia data in cloud computing. Multimed Tools Appl 75, 13077–13091 (2016). https://doi.org/10.1007/s11042-015-2594-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2594-5