An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing
In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data i...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2016-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7676382/ |
_version_ | 1819162515510132736 |
---|---|
author | Bin Feng Xinzhu Ma Cheng Guo Hui Shi Zhangjie Fu Tie Qiu |
author_facet | Bin Feng Xinzhu Ma Cheng Guo Hui Shi Zhangjie Fu Tie Qiu |
author_sort | Bin Feng |
collection | DOAJ |
description | In cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches. |
first_indexed | 2024-12-22T17:29:28Z |
format | Article |
id | doaj.art-29911bc81f194c729bcb3d0670bea874 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-22T17:29:28Z |
publishDate | 2016-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-29911bc81f194c729bcb3d0670bea8742022-12-21T18:18:40ZengIEEEIEEE Access2169-35362016-01-0147899791110.1109/ACCESS.2016.26210057676382An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud ComputingBin Feng0Xinzhu Ma1Cheng Guo2Hui Shi3Zhangjie Fu4Tie Qiu5https://orcid.org/0000-0003-2324-2523School of Software Technology, Dalian University of Technology, Dalian, ChinaSchool of Software Technology, Dalian University of Technology, Dalian, ChinaSchool of Software Technology, Dalian University of Technology, Dalian, ChinaNetwork Information Management Center, Liaoning Normal University, Dalian, ChinaSchool of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, ChinaSchool of Software Technology, Dalian University of Technology, Dalian, ChinaIn cloud computing, data owners host their data on cloud servers, and users (data consumers) can access the data from the cloud servers. This new paradigm of data hosting service also introduces new security challenges that require an independent auditing service to check the integrity of the data in the cloud. Some existing methods for checking the integrity of the data cannot handle this problem efficiently and they cannot deal with the error condition. Thus, a secure and efficient dynamic auditing protocol should reject requests that are made with improper authentication. In addition, an excellent remote data authentication method should be able to collect information for statistical analysis, such as validation results. In this paper, first we design an auditing framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we extend our auditing protocol to support dynamic data operations, which is efficient and has been proven to be secure in the random oracle model. We extended our auditing protocol further to support bidirectional authentication and statistical analysis. In addition, we use a better load distribution strategy, which greatly reduces the computational overhead of the client. Last, we provide an error response scheme, and our experiments show that our solution has good error-handling ability and offers lower overhead expenses for computation and communication than other approaches.https://ieeexplore.ieee.org/document/7676382/Cloud computingstorage securityprovable data possessionbidirectional authentication |
spellingShingle | Bin Feng Xinzhu Ma Cheng Guo Hui Shi Zhangjie Fu Tie Qiu An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing IEEE Access Cloud computing storage security provable data possession bidirectional authentication |
title | An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing |
title_full | An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing |
title_fullStr | An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing |
title_full_unstemmed | An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing |
title_short | An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing |
title_sort | efficient protocol with bidirectional verification for storage security in cloud computing |
topic | Cloud computing storage security provable data possession bidirectional authentication |
url | https://ieeexplore.ieee.org/document/7676382/ |
work_keys_str_mv | AT binfeng anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT xinzhuma anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT chengguo anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT huishi anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT zhangjiefu anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT tieqiu anefficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT binfeng efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT xinzhuma efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT chengguo efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT huishi efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT zhangjiefu efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing AT tieqiu efficientprotocolwithbidirectionalverificationforstoragesecurityincloudcomputing |