A Privacy-Preserving Outsourcing Data Storage Scheme with Oruta Data Auditing

Authors

  • Mrs. A. Kalaiyarasi  Department of Information Technology Muthayammal Engineering College (Autonomous), Tamilnadu, India
  • Dr. E. Punarselvam  Department of Information Technology Muthayammal Engineering College (Autonomous), Tamilnadu, India
  • B. Lavanya  Department of Information Technology Muthayammal Engineering College (Autonomous), Tamilnadu, India
  • A. Nivetha  Department of Information Technology Muthayammal Engineering College (Autonomous), Tamilnadu, India
  • A. Salai Amirtha Lakshmi  Department of Information Technology Muthayammal Engineering College (Autonomous), Tamilnadu, India
  • S. Kowsalya  Department of Information Technology Muthayammal Engineering College (Autonomous), Tamilnadu, India

DOI:

https://doi.org//10.32628/IJSRST12182111

Keywords:

Cloud Computing, IT services, Storage, Privacy-Preserving Auditing Scheme

Abstract

Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. With cloud computing and storage, users are able to access and to share resources offered by cloud service providers at a lower marginal cost. With cloud computing and storage services, data is not only stored in the cloud, but routinely shared among a large number of users in a group. In this project, we propose Oruta, a privacy-preserving auditing scheme for shared data with large groups in the cloud. We utilize ring signatures to compute verification information on shared data, so that the TPA is able to audit the correctness of shared data, but cannot reveal the identity of the signer on each block. We can implement the batch auditing scheme to perform efficient public auditing to protect both identity and data privacy in cloud environments.

References

  1. M. Armbrust, A. Fox, R. Griffith, A. D.Joseph, R. H.Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.
  2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2007, pp. 598–610.
  3. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” in Proc. IEEE International Conference on Computer Communications (INFOCOM), 2010, pp. 525–533.
  4. R. L. Rivest, A. Shamir, and Y. Tauman, “How to Leak a Secret,” in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer- Verlag, 2001, pp. 552–565.
  5. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” in Proc. In- ternational Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, 2003, pp. 416–432.
  6. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer- Verlag, 2008, pp. 90–107.
  7. Y. Zhu, H.Wang, Z. Hu, G.-J.Ahn, H. Hu, and S. S.Yau, “Dynamic Audit Services for Integrity Verification of Outsourced Storage in Clouds,” in Proc. ACM Symposium on Applied Computing (SAC), 2011, pp. 1550–1557.
  8. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” in Proc. IEEE International Conference on Computer Communications (INFOCOM), 2010, pp. 534–542.
  9. D. Boneh, B. Lynn, and H. Shacham, “Short Signature from the Weil Pairing,” in Proc. International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT). Springer-Verlag, 2001, pp. 514–532.
  10. D. Boneh and D. M. Freeman, “Homomorphic Signatures for Polynomial Functions,” in Proc. International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, 2011, pp. 149–168.
  11. A. L. Ferrara, M. Green, S. Hohenberger, and M. Ø. Pedersen, “Practical Short Signature Batch Verification,” in Proc. RSA Conference, the Cryptographers’ Track (CT-RSA). Springer-Verlag, 2009 pp. 309–324.
  12. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2006, pp. 89–98.
  13. A. Juels and B. S. Kaliski, “PORs: Proofs pfRetrievability for Large Files,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2007, pp. 584–597.
  14. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” in Proc. International Conference on Security and Privacy in Communication Networks (SecureComm), 2008.
  15. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2009, pp. 213–222.
  16. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” in Proc. IEEE/ACM International Workshop on Quality of Service (IWQoS), 2009, pp. 1–9.
  17. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote Data Checking for Network Coding-based Distributed Stroage Systems,” in Proc. ACM Cloud Computing Security Workshop (CCSW), 2010, pp. 31–42.
  18. N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, “LT Codesbased Secure and Reliable Cloud Storage Service,” in Proc. IEEE International Conference on Computer Communications (INFOCOM), 2012.
  19. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of Ownership in Remote Storage Systems,” in Proc. ACM Conference on Computer and Communications Security (CCS), 2011, pp. 491–500.
  20. Q. Zheng and S. Xu, “Secure and Efficient Proof of Storage with Deduplication,” in Proc. ACM Conference on Data and Application Security and Privacy (CODASPY), 2012.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Mrs. A. Kalaiyarasi, Dr. E. Punarselvam, B. Lavanya, A. Nivetha, A. Salai Amirtha Lakshmi, S. Kowsalya, " A Privacy-Preserving Outsourcing Data Storage Scheme with Oruta Data Auditing, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 8, Issue 2, pp.620-625, March-April-2021. Available at doi : https://doi.org/10.32628/IJSRST12182111