Abstract
Cloud computing model offers various platforms services and provides a scalable, on-demand service at any time-anywhere manner. However, in the outsourcing strategy, users no longer have direct control and ownership of data, which causes serious major concerns related to proper secure auditing. Previously, many schemes have been drafted to admit proper public verification through third-party authorities. On the other hand, these schemes may leak identity or data value to third party auditor (TPA) by making improbable expectations in a manner that the TPA has the adequate computation capability and can only handle static archive data blocks. So an efficient, secure, and dynamic auditing model is craved to prompt users that their sensitive data are accurately stored in the cloud data center. To accommodate this, we introduce a secure novel public auditing scheme named Dynamic Large Branching Hash Tree (DLBHT) with Homomorphic Verifiable Authenticator (HVA) based aggregate signature scheme, which performs auditing with less communication and computational overhead. This model supports batch auditing and batch dynamic updating operations by maintaining a provably secure dynamic large branching tree (DLBHT) at the cloud server-side. The security and performance analysis of our model shows that it is efficient and secure for practical arrangements, which specifically diminishes communication and computational cost of auditing procedure.





Similar content being viewed by others
References
Fox, A. et al.: Above the clouds: a berkeley view of cloud computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS 28(13) (2009)
Marston, S., et al.: Cloud computing—The business perspective. Decis. Support Syst. 51(1), 176–189 (2011)
Lombardi, F., Di Pietro, R.: Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4), 1113–1122 (2011)
Mell, P., Tim, G.: The NIST definition of cloud computing. (2011)
Yu, J., et al.: Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Forensics Secur. 10(6), 1167–1179 (2015)
Li, A., Tan, S., Jia, Y.: A method for achieving provable data integrity in cloud computing. J. Supercomput. 75(1), 92–108 (2019)
Sudhakar, R.V., Rao, T.C.M.: Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications. Clust. Comput. (2020). https://doi.org/10.1007/s10586-019-03028-7
Liu, C., et al.: Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans. Parallel Distrib. Syst. 25(9), 2234–2244 (2013)
Ateniese, G., et al.: Provable data possession at untrusted stores. Proceedings of the 14th ACM conference on Computer and communications security (2007)
Chris, E.C., et al.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–29 (2015)
Liu, C., et al.: MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2014)
Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)
Wang, Q., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2010)
Juels, A., Burton S. Kaliski Jr.: Pors: proofs of retrievability for large files. Proceedings of the 14th ACM conference on Computer and communications security. ACM (2007)
Ateniese, G., et al.: Scalable and efficient provable data possession. Proceedings of the 4th international conference on Security and privacy in communication networks (2008)
Balasubramanian, V., Mala, T.: Cloud data integrity checking using bilinear pairing and network coding. Clust. Comput. 22(3), 6927–6935 (2019)
Rabaninejad, R., Rajabzadeh Asaar, M., Ahmadian Attari, M., et al.: An identity-based online/offline secure cloud storage auditing scheme. Cluster Comput. 23, 1455–1468 (2020)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput. 2(1), 43–56 (2014)
Curtmola, R., et al.: MR-PDP: Multiple-replica provable data possession. 2008 the 28th international conference on distributed computing systems. IEEE (2008)
Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf. Forensics Secur. 12(4), 767–778 (2016)
Wang, H., et al.: Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans. Serv. Comput. 12(5), 824–835 (2016)
Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2015)
Li, Y., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. 16(1), 72–83 (2017)
Zhang, Y., et al.: Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput. 3(5), 44–52 (2016)
Garg, S., et al.: Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5), 113–120 (2016)
Ramesh, D., Mishra, R., Edla, D.R.: Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy. Arab. J. Sci. Eng. 42(2), 873–883 (2017)
Ramesh, D., Mishra, R., Pandit, A.K.: An efficient stream cipher based secure and dynamic updation method for cloud data centre. International Conference on Soft Computing Systems. Springer, Singapore (2018)
Shen, W., et al.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)
Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Forensics Secur. 11(6), 1165–1176 (2016)
Wang, T., et al.: An alternative approach to public cloud data auditing supporting data dynamics. Soft Comput. 23(13), 4939–4953 (2019)
Anbuchelian, S., Sowmya, C.M., Ramesh, C.: Efficient and secure auditing scheme for privacy preserving data storage in cloud. Cluster Comput. 22(4), 9767–9775 (2019)
Tian, J., Jing, X.: A lightweight secure auditing scheme for shared data in cloud storage. IEEE Access 7, 68071–68082 (2019)
Zhang, J., et al.: New public auditing protocol based on homomorphic tags for secure cloud storage. Concurrency Comput. (2019). https://doi.org/10.1002/cpe.5600
Daniel, E., Vasanthi, N.A.: LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Clust. Comput. 22(1), 1247–1258 (2019)
Suguna, M., Shalinie, S.M.: Privacy preserving auditing protocol for remote data storage. Clust. Comput. 22(3), 6891–6898 (2019)
Shen, W., et al.: Data integrity auditing without private key storage for secure cloud storage. IEEE Trans. Cloud Comput. (2019)
Tian, H., et al.: Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17(1), 10–22 (2019)
Hou, H., et al.: Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. Clust. Comput. 21(4), 1849–1863 (2018)
Drijvers, M., Neven, G.: Forward-secure multi-signatures. IACR Cryptol. ePrint Arch. 2019, 261 (2019)
Selvi, S., Deva, S., et al.: Security Analysis of Aggregate signature and Batch verification signature schemes. IACR Cryptol. ePrint Arch. 2009, 290 (2009)
Zhang, F., et al.: A new short signature scheme without random oracles from bilinear pairings. IACR Cryptol. ePrint Arch. 2005, 386 (2005)
Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. International Workshop on Public Key Cryptography, Springer, Berlin, Heidelberg (2004)
Li, J., et al.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314–322 (2012)
Rastegari, P., et al.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479, 321–334 (2019)
Yang, G., et al.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)
Sookhak, M., et al.: Dynamic remote data auditing for securing big data storage in cloud computing. (2015).
Wang, F., et al.: Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69, 521–533 (2018)
Fu, A., et al.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data. (2017). https://doi.org/10.1109/TBDATA.2017.2701347
Acknowledgements
This research work is supported by Indian Institute of Technology (ISM), Dhanbad, Govt. of India. The authors wish to express their gratitude and heartiest thanks to the Department of Computer Science & Engineering, Indian Institute of Technology (ISM), Dhanbad, India for providing their research support.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mishra, R., Ramesh, D. & Edla, D.R. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment. Cluster Comput 24, 1361–1379 (2021). https://doi.org/10.1007/s10586-020-03193-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-020-03193-0