4.7 Article

Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 10, Issue 5, Pages 701-714

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2015.2512589

Keywords

Cloud storage; cloud security; public auditing; dynamic hash table

Funding

  1. Program for Science & Technology Innovation Teams and Leading Talents of Huaqiao University [2014 KJTD13]
  2. Promotion Program for Young and Middle-aged Teacher in Science & Technology Research of Huaqiao University [ZQN-PY115]
  3. Education and Science Research Program for Young and Middle-aged Teachers of Fujian Province of China [JA13012]
  4. Research Program for Outstanding Young Teachers in Higher Education Institutions of Fujian Province of China [MJK2015-54]
  5. Natural Science Foundation of Fujian Province of China [2014J01238]
  6. Natural Science Foundation of China [U1405254, U1536115, 61302094, 61370007, 61202468]

Ask authors/readers for more resources

Cloud storage is an increasingly popular application of cloud computing, which can provide on-demand outsourcing data services for both organizations and individuals. However, users may not fully trust the cloud service providers (CSPs) in that it is difficult to determine whether the CSPs meet their legal expectations for data security. Therefore, it is critical to develop efficient auditing techniques to strengthen data owners' trust and confidence in cloud storage. In this paper, we present a novel public auditing scheme for secure cloud storage based on dynamic hash table (DHT), which is a new two-dimensional data structure located at a third parity auditor (TPA) to record the data property information for dynamic auditing. Differing from the existing works, the proposed scheme migrates the authorized information from the CSP to the TPA, and thereby significantly reduces the computational cost and communication overhead. Meanwhile, exploiting the structural advantages of the DHT, our scheme can also achieve higher updating efficiency than the state-of-the-art schemes. In addition, we extend our scheme to support privacy preservation by combining the homomorphic authenticator based on the public key with the random masking generated by the TPA, and achieve batch auditing by employing the aggregate BIS signature technique. We formally prove the security of the proposed scheme, and evaluate the auditing performance by detailed experiments and comparisons with the existing ones. The results demonstrate that the proposed scheme can effectively achieve secure auditing for cloud storage, and outperforms the previous schemes in computation complexity, storage costs and communication overhead.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available