Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment | Cluster Computing Skip to main content
Log in

Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing model offers various platforms services and provides a scalable, on-demand service at any time-anywhere manner. However, in the outsourcing strategy, users no longer have direct control and ownership of data, which causes serious major concerns related to proper secure auditing. Previously, many schemes have been drafted to admit proper public verification through third-party authorities. On the other hand, these schemes may leak identity or data value to third party auditor (TPA) by making improbable expectations in a manner that the TPA has the adequate computation capability and can only handle static archive data blocks. So an efficient, secure, and dynamic auditing model is craved to prompt users that their sensitive data are accurately stored in the cloud data center. To accommodate this, we introduce a secure novel public auditing scheme named Dynamic Large Branching Hash Tree (DLBHT) with Homomorphic Verifiable Authenticator (HVA) based aggregate signature scheme, which performs auditing with less communication and computational overhead. This model supports batch auditing and batch dynamic updating operations by maintaining a provably secure dynamic large branching tree (DLBHT) at the cloud server-side. The security and performance analysis of our model shows that it is efficient and secure for practical arrangements, which specifically diminishes communication and computational cost of auditing procedure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Fox, A. et al.: Above the clouds: a berkeley view of cloud computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, Rep. UCB/EECS 28(13) (2009)

  2. Marston, S., et al.: Cloud computing—The business perspective. Decis. Support Syst. 51(1), 176–189 (2011)

    Article  Google Scholar 

  3. Lombardi, F., Di Pietro, R.: Secure virtualization for cloud computing. J. Netw. Comput. Appl. 34(4), 1113–1122 (2011)

    Article  Google Scholar 

  4. Mell, P., Tim, G.: The NIST definition of cloud computing. (2011)

  5. Yu, J., et al.: Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Forensics Secur. 10(6), 1167–1179 (2015)

    Article  Google Scholar 

  6. Li, A., Tan, S., Jia, Y.: A method for achieving provable data integrity in cloud computing. J. Supercomput. 75(1), 92–108 (2019)

    Article  Google Scholar 

  7. Sudhakar, R.V., Rao, T.C.M.: Security aware index based quasi–identifier approach for privacy preservation of data sets for cloud applications. Clust. Comput. (2020). https://doi.org/10.1007/s10586-019-03028-7

    Article  Google Scholar 

  8. Liu, C., et al.: Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans. Parallel Distrib. Syst. 25(9), 2234–2244 (2013)

    Article  Google Scholar 

  9. Ateniese, G., et al.: Provable data possession at untrusted stores. Proceedings of the 14th ACM conference on Computer and communications security (2007)

  10. Chris, E.C., et al.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–29 (2015)

    Google Scholar 

  11. Liu, C., et al.: MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  12. Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  13. Wang, Q., et al.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2010)

    Article  Google Scholar 

  14. Juels, A., Burton S. Kaliski Jr.: Pors: proofs of retrievability for large files. Proceedings of the 14th ACM conference on Computer and communications security. ACM (2007)

  15. Ateniese, G., et al.: Scalable and efficient provable data possession. Proceedings of the 4th international conference on Security and privacy in communication networks (2008)

  16. Balasubramanian, V., Mala, T.: Cloud data integrity checking using bilinear pairing and network coding. Clust. Comput. 22(3), 6927–6935 (2019)

    Article  Google Scholar 

  17. Rabaninejad, R., Rajabzadeh Asaar, M., Ahmadian Attari, M., et al.: An identity-based online/offline secure cloud storage auditing scheme. Cluster Comput. 23, 1455–1468 (2020)

    Article  Google Scholar 

  18. Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput. 2(1), 43–56 (2014)

    Article  Google Scholar 

  19. Curtmola, R., et al.: MR-PDP: Multiple-replica provable data possession. 2008 the 28th international conference on distributed computing systems. IEEE (2008)

  20. Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf. Forensics Secur. 12(4), 767–778 (2016)

    Article  Google Scholar 

  21. Wang, H., et al.: Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans. Serv. Comput. 12(5), 824–835 (2016)

    Article  Google Scholar 

  22. Jiang, T., Chen, X., Ma, J.: Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans. Comput. 65(8), 2363–2373 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  23. Li, Y., et al.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secure Comput. 16(1), 72–83 (2017)

    Article  Google Scholar 

  24. Zhang, Y., et al.: Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput. 3(5), 44–52 (2016)

    Article  Google Scholar 

  25. Garg, S., et al.: Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5), 113–120 (2016)

    Article  Google Scholar 

  26. Ramesh, D., Mishra, R., Edla, D.R.: Secure data storage in cloud: an e-stream cipher-based secure and dynamic updation policy. Arab. J. Sci. Eng. 42(2), 873–883 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  27. Ramesh, D., Mishra, R., Pandit, A.K.: An efficient stream cipher based secure and dynamic updation method for cloud data centre. International Conference on Soft Computing Systems. Springer, Singapore (2018)

  28. Shen, W., et al.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)

    Article  Google Scholar 

  29. Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Forensics Secur. 11(6), 1165–1176 (2016)

    Article  Google Scholar 

  30. Wang, T., et al.: An alternative approach to public cloud data auditing supporting data dynamics. Soft Comput. 23(13), 4939–4953 (2019)

    Article  MATH  Google Scholar 

  31. Anbuchelian, S., Sowmya, C.M., Ramesh, C.: Efficient and secure auditing scheme for privacy preserving data storage in cloud. Cluster Comput. 22(4), 9767–9775 (2019)

    Article  Google Scholar 

  32. Tian, J., Jing, X.: A lightweight secure auditing scheme for shared data in cloud storage. IEEE Access 7, 68071–68082 (2019)

    Article  Google Scholar 

  33. Zhang, J., et al.: New public auditing protocol based on homomorphic tags for secure cloud storage. Concurrency Comput. (2019). https://doi.org/10.1002/cpe.5600

    Article  Google Scholar 

  34. Daniel, E., Vasanthi, N.A.: LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Clust. Comput. 22(1), 1247–1258 (2019)

    Article  Google Scholar 

  35. Suguna, M., Shalinie, S.M.: Privacy preserving auditing protocol for remote data storage. Clust. Comput. 22(3), 6891–6898 (2019)

    Article  Google Scholar 

  36. Shen, W., et al.: Data integrity auditing without private key storage for secure cloud storage. IEEE Trans. Cloud Comput. (2019)

  37. Tian, H., et al.: Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17(1), 10–22 (2019)

    Article  Google Scholar 

  38. Hou, H., et al.: Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. Clust. Comput. 21(4), 1849–1863 (2018)

    Article  Google Scholar 

  39. Drijvers, M., Neven, G.: Forward-secure multi-signatures. IACR Cryptol. ePrint Arch. 2019, 261 (2019)

    Google Scholar 

  40. Selvi, S., Deva, S., et al.: Security Analysis of Aggregate signature and Batch verification signature schemes. IACR Cryptol. ePrint Arch. 2009, 290 (2009)

    Google Scholar 

  41. Zhang, F., et al.: A new short signature scheme without random oracles from bilinear pairings. IACR Cryptol. ePrint Arch. 2005, 386 (2005)

    Google Scholar 

  42. Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. International Workshop on Public Key Cryptography, Springer, Berlin, Heidelberg (2004)

    Book  MATH  Google Scholar 

  43. Li, J., et al.: An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2), 314–322 (2012)

    Article  Google Scholar 

  44. Rastegari, P., et al.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inf. Sci. 479, 321–334 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  45. Yang, G., et al.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)

    Article  Google Scholar 

  46. Sookhak, M., et al.: Dynamic remote data auditing for securing big data storage in cloud computing. (2015).

  47. Wang, F., et al.: Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69, 521–533 (2018)

    Article  Google Scholar 

  48. Fu, A., et al.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data. (2017). https://doi.org/10.1109/TBDATA.2017.2701347

    Article  Google Scholar 

Download references

Acknowledgements

This research work is supported by Indian Institute of Technology (ISM), Dhanbad, Govt. of India. The authors wish to express their gratitude and heartiest thanks to the Department of Computer Science & Engineering, Indian Institute of Technology (ISM), Dhanbad, India for providing their research support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dharavath Ramesh.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, R., Ramesh, D. & Edla, D.R. Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment. Cluster Comput 24, 1361–1379 (2021). https://doi.org/10.1007/s10586-020-03193-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-020-03193-0

Keywords