Skip to main content
Log in

Data error locations reported by public auditing in cloud storage service

  • Published:
Automated Software Engineering Aims and scope Submit manuscript

Abstract

Public auditing is an important issue in cloud storage service because a cloud service provider may try to hide management mistakes and system errors from users or even steal or tamper with a user’s data for monetary reasons. Without the protection of a proper auditing mechanism, cloud users would have to run high risks of having their legal rights and interests spoiled without their knowledge. Therefore, many data integrity, assurance, and correctness schemes have been proposed for data auditing. Most of these schemes work by randomly sampling and aggregating signatures from bilinear maps (for more efficiency) to check whether the cloud storage service is honest and whether the data stored in the cloud is correct. Although aggregating signatures can reduce the auditor’s computing overhead and time, unfortunately, none of these schemes have offered any workable solution to giving detailed information on where the errors are when the cloud data as a whole fails the auditing. To fix this problem, we shall propose a new public auditing scheme with a mechanism integrated into it especially to locate the problematic data blocks when they exist. With efficiency, the proposed scheme is capable not only of giving an accurate pass/fail report but also providing detailed information on the locations of the errors detected.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Ateniese, G., Kevin, F.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  MATH  Google Scholar 

  • Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, New York, NY, pp. 598–610, October (2007)

  • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, pp. 514–532, December (2001)

  • Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.: Evaluating the performance of symmetric encryption algorithms’. Int. J. Netw. Secur. 10(3), 216–222 (2010)

    Google Scholar 

  • Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. Lect. Notes Comput. Sci. 3156, 119–132 (2004)

    Article  Google Scholar 

  • Lee, C.-C., Chung, P.-S., Hwang, M.-S.: A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15(4), 231–240 (2013)

    Google Scholar 

  • Li, C.-T., Hwang, M.-S.: A batch verifying and detecting the illegal signatures. Int. J. Innov. Comput. Inf. Control 6(12), 5311–5320 (2010)

    Google Scholar 

  • Liu, Q., Wang, G., Wu, J.: Efficient sharing of secure cloud storage services. In: Proceeding of the 10th IEEE International Conference on Computer and Information Technology (CIT 2010), Bradford, USA, pp. 922–929, June (2010)

  • Liu, H., Zhang, P., Liu, J.: Public data integrity verification for secure cloud storage. J. Netw. 8(2), 373–380 (2013)

    Google Scholar 

  • Rajathi, A., Saravanan, N.: A survey on secure storage in cloud computing. Indian J. Sci. Technol. 6(4), 4396–4401 (2013)

    Google Scholar 

  • Rifa-Pous, H., Herrera-Joancomarti, J.: Computational and energy costs of cryptographic algorithms on handheld devices. Future Internet 3(1), 31–48 (2011)

    Article  Google Scholar 

  • Sanka, S., Hota, C., Rajarajan, M.: Secure data access in cloud computing. In: Proceeding of the 4th International Conference on Internet Multimedia Systems Architecture and Applications (IMSAA-10), Bangalore, India, pp. 1–6, December (2009)

  • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security–ASIACRYPT 2008, Melbourne, Australia, p. 90V107, December (2008)

  • Shucheng, Y., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data dccess control in cloud computing. In: Proceeding of the 29th IEEE INFOCOM 2010, San Diego, CA, pp. 1–9, March (2010)

  • Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Google Scholar 

  • Sun, T.H.: A study of key management and data auditing in cloud storage service. Master’s Thesis of National Chung Hsing University, Taichung, Taiwan, pp. 1–65 (2012)

  • Syam Kumar, P., Subramanian, R.: RSA-based dynamic public audit service for integrity verification of data storage in cloud computing using Sobol sequence. Int. J. Cloud Comput. 1(2), 167–200 (2012)

    Google Scholar 

  • Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors. Lect. Notes Comput. Sci. 4307, 519–528 (2006)

    Article  Google Scholar 

  • Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceeding of the 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, IL, pp. 735–737, October (2010a)

  • Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: Proceeding of the 29th IEEE INFOCOM 2010, San Diego, CA, pp. 1–9 March (2010b)

  • Wang, G., Liu, Q., Jie, W., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5), 311–320 (2011a)

  • Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Towards secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 4(4), 1–14 (2011b)

  • Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011c)

  • Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)

    Article  Google Scholar 

  • Zhu, Y., Hongxin, H.: Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5), 1083–1095 (2012)

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to express their appreciation to the anonymous referees for their valuable suggestions and comments. This research was partially supported by the National Science Council, Taiwan, ROC, under Contract No. NSC102-2221-E-030-003.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng-Chi Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hwang, MS., Lee, CC. & Sun, TH. Data error locations reported by public auditing in cloud storage service. Autom Softw Eng 21, 373–390 (2014). https://doi.org/10.1007/s10515-014-0142-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10515-014-0142-6

Keywords

Navigation