An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA | Wireless Personal Communications Skip to main content

Advertisement

Log in

An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Cloud storage is a cloud based service which delivers scalable on demand on line storage of data and eliminates the need of maintaining local data centre. Storage of data in cloud brings many advantages such as lower-cost, metered service, scalable and ubiquitous access. However, it also raises concerns to its integrity; to save the storage space cloud service provider may delete some rarely access data. Data privacy is another issue which must be addressed to increase data owner’s trust. To address above issues, many researchers have proposed public auditing schemes to validate the integrity of data using third party auditor. These schemes generate metadata using data files on the owner side and store these metadata on the cloud storage along with the file data, which helps in auditing. These schemes address many concerns which arise due to remote data storage. However, computation cost involved for metadata generation at the data owner side is not properly addressed; another issue which is not properly addressed is an iniquitous third party auditor may be the source of denial of service attack by issuing constantly large number of audit request. Our scheme solves these issues by lowering the computation cost at data owner side and controlling the number of times a third party auditor can issue an audit request to the cloud storage. Our Scheme also supports secure access of data using conditional proxy re-encryption scheme and delegation of auditing task by the authorized third party auditor to another auditor for the specified period of times in the case of unavailability of authorized third party auditor.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583–592.

    Article  Google Scholar 

  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In: Proceeding. 14th ACM Conference Computer and Comm. Security (CCS 07) (pp. 598–609).

  3. Juels, A., & Kaliski, B., S. (2007). Pors: Proofs of retrievability for large files. In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security. New York (pp. 584–597).

  4. Tang, Q. (2008). Type-based proxy re-encryption and its construction. In Indocrypt 2008, LNCS 5365, Springer, Heidelberg (pp. 130–144).

  5. Weng, J., Robert, H., Deng, Ding, X., Cheng-Kang, C., & Junzuo, L. (2009). Conditional proxy re-encryption secure against chosen-ciphertext attack. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, March 1012, Sydney, Australia. https://doi.org/10.1145/1533057.1533100.

  6. Deswarte, Y., Quisquater, J. J., & Saïdane, A. (2006). Remote integrity checking. In Proceedings of IICIS 2003 (pp. 1–11).

  7. Filho, D. L. Z.,& Barreto, P. S. L. M. (2006). Demonstrating Data Possession and Uncheatable Data Transfer. In Cryptology ePrint Archive, Report2006/150, 2006, http://eprint.iacr.org.

  8. Zhang, Y., Ni, J., Tao, X., Wang, Y., & Yu, Y. (2016). Provable multiple replication data possession with full dynamics for secure cloud storage. Concurrency and Computation: Practice and Experience, 28(4), 1161–1173.

    Article  Google Scholar 

  9. Abo-alian, A., Badr, N. L., & Tolba, M. F. (2017). Integrity as a service for replicated data on the cloud. Concurrency and Computation: Practice and Experience, 29(4), e3883.

    Article  Google Scholar 

  10. Anandakumar, H., & Umamaheswari, K. (2017). Supervised machine learning techniques in cognitive radio networks during cooperative spectrum handovers. Cluster Computing, 20(2), 1505–1515. https://doi.org/10.1007/s10586-017-0798-3.

    Article  Google Scholar 

  11. Erway, C. C., Kupcu, A., Papamanthou, C., & Tamassia R. (2009). Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Illinois, USA (pp. 213–222).

  12. Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2010). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 22(5), 847–859.

    Article  Google Scholar 

  13. Liu, C., Chen, J., Yang, L. T., Zhang, X., Yang, C., Ranjan, R., et al. (2013). Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems, 25(9), 2234–2244.

    Article  Google Scholar 

  14. Poornima, S. N., & Ponmagal, R. S. (2016). Secure preserving public auditing for regenerating code based on cloud storage. Networking Communication Engineering, 8(5), 200–204.

    Google Scholar 

  15. Sookhak, M., Yu, F. R., & Zomaya, A. Y. (2017). Auditing big data storage in cloud computing using divide and conquer tables. IEEE Transactions on Parallel and Distributed Systems, 29(5), 999–1012.

    Article  Google Scholar 

  16. Liang, K., Susilo, W., Liu, J. K., & Wong, D. S. (2015). Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. The Computer Journal, 58(10), 2778–2792.

    Article  Google Scholar 

  17. Anandakumar, H., & Umamaheswari, K. (2018). A bio-inspired swarm intelligence technique for social aware cognitive radio handovers. Computers & Electrical Engineering, 71, 925–937. https://doi.org/10.1016/j.compeleceng.2017.09.016.

    Article  Google Scholar 

  18. Zeng, P., & Choo, K. K. R. (2018). A new kind of conditional proxy re-encryption for secure cloud storage. IEEE Access, 6, 70017–70024. https://doi.org/10.1109/access.2018.2879479.

    Article  Google Scholar 

  19. Boneh, D., Gentry, G., Lynn B., & Shacham, H.(2003). Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings 22nd internationall conference theory and applications of cryptographic techniques (Eurocrypt ’03) (pp. 416–432).

  20. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard, Accessed April 12, 2019.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abu Salim.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and Animal Rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salim, A., Tiwari, R.K. & Tripathi, S. An Efficient Public Auditing Scheme for Cloud Storage with Secure Access Control and Resistance Against DOS Attack by Iniquitous TPA. Wireless Pers Commun 117, 2929–2954 (2021). https://doi.org/10.1007/s11277-020-07079-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07079-7

Keywords