An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing

In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data i...

Full description

Bibliographic Details
Main Authors: Bin Feng, Xinzhu Ma, Cheng Guo, Hui Shi, Zhangjie Fu, Tie Qiu
Format: Article
Language:English
Published: IEEE 2016-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7676382/
_version_ 1819162515510132736
author Bin Feng
Xinzhu Ma
Cheng Guo
Hui Shi
Zhangjie Fu
Tie Qiu
author_facet Bin Feng
Xinzhu Ma
Cheng Guo
Hui Shi
Zhangjie Fu
Tie Qiu
author_sort Bin Feng
collection DOAJ
description In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.
first_indexed 2024-12-22T17:29:28Z
format Article
id doaj.art-29911bc81f194c729bcb3d0670bea874
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-22T17:29:28Z
publishDate 2016-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-29911bc81f194c729bcb3d0670bea8742022-12-21T18:18:40ZengIEEEIEEE Access2169-35362016-01-0147899791110.1109/ACCESS.2016.26210057676382An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud ComputingBin Feng0Xinzhu Ma1Cheng Guo2Hui Shi3Zhangjie Fu4Tie Qiu5https://orcid.org/0000-0003-2324-2523School of Software Technology, Dalian University of Technology, Dalian, ChinaSchool of Software Technology, Dalian University of Technology, Dalian, ChinaSchool of Software Technology, Dalian University of Technology, Dalian, ChinaNetwork Information Management Center, Liaoning Normal University, Dalian, ChinaSchool of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, ChinaSchool of Software Technology, Dalian University of Technology, Dalian, ChinaIn cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.https://ieeexplore.ieee.org/document/7676382/Cloud computingstorage securityprovable data possessionbidirectional authentication
spellingShingle Bin Feng
Xinzhu Ma
Cheng Guo
Hui Shi
Zhangjie Fu
Tie Qiu
An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
IEEE Access
Cloud computing
storage security
provable data possession
bidirectional authentication
title An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
title_full An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
title_fullStr An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
title_full_unstemmed An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
title_short An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
title_sort efficient protocol with bidirectional verification for storage security in cloud computing
topic Cloud computing
storage security
provable data possession
bidirectional authentication
url https://ieeexplore.ieee.org/document/7676382/
work_keys_str_mv AT binfeng anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT xinzhuma anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT chengguo anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT huishi anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT zhangjiefu anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT tieqiu anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT binfeng efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT xinzhuma efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT chengguo efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT huishi efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT zhangjiefu efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing
AT tieqiu efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing