Auditing the Shared Data in Cloud through Privacy Preserving Mechanisms

V.Ramya Sai*, Lokanadham Naidu Vadlamudi**, Srinivasulu Asadi***
** Assistant Professor, Department of Information Technology, Sree Vidyanikethan Engineering College (Autonomous), Andhra Pradesh
*** Ph.D Scholar, Jawaharlal Nehru Technological University, Anantapur, India.
Periodicity:February - April'2015
DOI : https://doi.org/10.26634/jcc.2.2.3448

Abstract

With cloud storage services, it is routine that data is not only stored in the cloud, but also shared among group of users. However, public auditing for such distributed data at the same time by preserving identity privacy remains a challenge. This paper proposes a privacy preserving public auditing technique for shared data called ‘Oruta’ which supports auditing, data privacy and identity privacy. This scheme is mainly focused on ring signatures to calculate the information needed for verification to audit the integrity of shared data. By using this auditing, the signer identity on each block is kept unconditionally private from a Third Party Auditor (TPA). This paper also aims to implement traceability, i.e.., the group manager or the original user will know who are editing the data in some special situations based on verification of Metadata. By doing this, the privacy will be preserved and the group manager or the original user can trace the signer, so the original user can have complete control over the data and the signers who are accessing the data.

Keywords

Cloud Computing, Ring Signature, Traceability, ORUTA (One Ring to Rule Them All), Third Party Auditor (TPA), Public Auditing.

How to Cite this Article?

Sai, V. R., Naidu, V. L., and Srinivasulu, A. (2015). Auditing the Shared Data in Cloud through Privacy Preserving Mechanisms. i-manager’s Journal on Cloud Computing, 2(2), 22-30. https://doi.org/10.26634/jcc.2.2.3448

References

[1]. Boyang Wang, (2014). “Oruta: Privacy Preserving Public Auditing for Shared Data in the Cloud”, IEEE Transactions on Cloud Computing, Vol. 2, No. 1, pp. 43- 56.
[2]. C. Wang, Q. Wang, K. Ren, and W. Lou, (2010). “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 525-533.
[3]. Wang J, Zhao Y et al. (2009). “Providing Privacy Preser ving in cloud computing ”, International Conference on Test and Measurement, Vol. 2, pp. 213–216.
[4]. Wang B, Li B et al. (2012). “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE Fifth International Conference on Cloud Computing, pp. 295–302.
[5]. Wang C, Chow S S M et al. (2013). “Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE Transactions on Computers, Vol. 62, No. 2, pp. 362–375.
[6]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, (2007). “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 598-610.
[7]. B. Wang, M. Li, S.S. Chow, and H. Li, (2013). “Computing Encrypted Cloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf. Comm. and Network Security (CNS '13), pp. 90-99.
[8]. H. Shacham and B. Waters, (2008). “Compact Proofs of Retrievability”, Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08), pp. 90-107.
[9]. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, (2009). “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS'09), pp. 213-222.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.