Privacy Protection Data and Batch Auditing Through Public Auditing Scheme

Amiripalli Naga Vamsi Krishna, P. Bala Krishna Prasad


We introduce a novel open evaluating plan for secure distributed storage in view of dynamic hash table (DHT), which is another two-dimensional information structure situated at a third parity auditor (TPA) to record the information property data for dynamic examining. Contrasting from the current works, the proposed conspire moves the approved data from the CSP to the TPA, and accordingly essentially diminishes the computational cost and correspondence overhead. In the interim, abusing the auxiliary focal points of the DHT, our plan can likewise accomplish higher refreshing effectiveness than the cutting edge plans. Furthermore, we extend our plan to bolster security conservation by joining the homomorphic authenticator in view of people in general key with the arbitrary concealing created by the TPA, and accomplish group inspecting by utilizing the total BLS signature strategy. We formally demonstrate the security of the proposed conspire, and assess the inspecting execution by point by point investigations and correlations with the current ones.


H. Dewan and R. C. Hansdah. ʺA Survey of Cloud Storage Facilitiesʺ, Proc. 7th IEEE World Congress on Services, pp. 224‐231,July 2011.

C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou. ʺToward Secureand Dependable Storage Services in Cloud Computingʺ, IEEETrans. Service Computing, vol. 5, no. 2, pp. 220‐232, 2012.

K. Ren, C. Wang and Q. Wang. “Security Challenges for thePublic Cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012.

J. Ryoo, S. Rizvi, W. Aiken and J. Kissell. ʺCloud Security Auditing:Challenges and Emerging Approachesʺ, IEEE Security &Privacy, vol. 12, no. 6, pp. 68‐74, 2014.

C. Wang, K. Ren, W. Lou and J. Li. ʺToward Publicly AuditableSecure Cloud Data Storage Servicesʺ, IEEE network, vol. 24, no. 4,pp. 19‐24, 2010.

Q. Wang, C. Wang, K. Ren, W. Lou and J. Li. ‘‘Enabling PublicAuditability and Data Dynamics for Storage Security in CloudComputing,’’ IEEE Trans. on Parallel and Distributed Systems, vol.22, no. 5, pp. 847‐859, 2011.

F. Sebé, J. Domingo‐Ferrer, A. Martínez‐Ballesté, Y. Deswarteand J.‐J. Quisquater, “Efficient Remote Data Possession Checkingin Critical Information Infrastructures,” IEEE Trans.Knowledge Data Eng., vol. 20, no. 8, pp. 1034‐1038, 2008.

A. Juels and B.S. Kaliski Jr., “PoRs: Proofs of Retrievability forLarge Files,” Proc. ACM Conf. Computer and Communications Security

(CCS ’07), pp. 584‐597, 2007.

G. Ateniese, R.B. Johns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson and D. Song, ‘‘Provable Data Possession at UntrustedStores,’’ Proc. 14th ACM Conf. on Comput.andCommun. Security(CCS), pp. 598‐609, 2007.

K. Yang and X. Jia. ʺData Storage Auditing Service in CloudComputing: Challenges, Methods and Opportunitiesʺ. WorldWide Web, vol. 15, no. 4, pp. 409‐428, 2012

C. Wang, Q. Wang, K. Ren and W. Lou, ‘‘Privacy‐PreservingPublic Auditing for Data Storage Security in Cloud Computing,’’Proc. IEEE INFOCOM, pp. 1‐9, 2010.

C. Wang, S. M. Chow, Q. Wang, K. Ren and W. Lou, ʺPrivacy‐Preserving Public Auditing for Secure Cloud Storage,ʺ IEEETrans. on Computers, vol. 62, no. 2, pp. 362‐375, 2013.

Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable DataPossession for Integrity Verification in Multi‐Cloud Storage,”

IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp.2231‐2244, 2012.

K. Yang and X. Jia, “An Efficient and Secure Dynamic AuditingProtocol for Data Storage in Cloud Computing,” IEEE Trans. on

Parallel and Distributed Systems, vol. 24, no. 9, pp.1717‐1726, 2013.

C. C. Erway, A. Küpçü, C. Papamanthou and R.Tamassia.“Dynamic Provable Data Possession,” Proc. 16th ACMConf. Computer and Comm. Security, pp. 213‐222, 2009.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at