The Community for Technology Leaders
RSS Icon
Issue No.02 - April-June (2013 vol.6)
pp: 227-238
Yan Zhu , Sch. of Comput. & Commun. Eng., Univ. of Sci. & Technol. Beijing, Beijing, China
Gail-Joon Ahn , Sch. of Comput., Inf., & Decision Syst. Eng., Arizona State Univ., Tempe, AZ, USA
Hongxin Hu , Dept. of Comput. & Inf. Sci., Delaware State Univ., Dover, DE, USA
S. S. Yau , Sch. of Comput., Inf., & Decision Syst. Eng., Arizona State Univ., Tempe, AZ, USA
Chang-Jun Hu , Sch. of Comput. & Commun. Eng., Univ. of Sci. & Technol. Beijing, Beijing, China
In this paper, we propose a dynamic audit service for verifying the integrity of an untrusted and outsourced storage. Our audit service is constructed based on the techniques, fragment structure, random sampling, and index-hash table, supporting provable updates to outsourced data and timely anomaly detection. In addition, we propose a method based on probabilistic query and periodic verification for improving the performance of audit services. Our experimental results not only validate the effectiveness of our approaches, but also show our audit system verifies the integrity with lower computation overhead and requiring less extra storage for audit metadata.
Protocols, Cloud computing, Computer architecture, Cryptography, Availability, Probabilistic logic, cloud storage, Storage security, provable data possession, audit service
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, S. S. Yau, H. G. An, Chang-Jun Hu, "Dynamic Audit Services for Outsourced Storages in Clouds", IEEE Transactions on Services Computing, vol.6, no. 2, pp. 227-238, April-June 2013, doi:10.1109/TSC.2011.51
[1] Amazon Web Services, "Amazon S3 Availability Event: July 20, 2008," , July 2008.
[2] A. Juels and B.S. KaliskiJr., "PORs: Proofs of Retrievability for Large Files," Proc. ACM Conf. Computer and Communications Security (CCS '07), pp. 584-597, 2007.
[3] M. Mowbray, "The Fog over the Grimpen Mire: Cloud Computing and the Law," Technical Report HPL-2009-99, HP Lab., 2009.
[4] A.A. Yavuz and P. Ning, "BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems," Proc. Ann. Computer Security Applications Conf. (ACSAC), pp. 219-228, 2009.
[5] G. Ateniese, R.C. Burns, R. Curtmola, J. Herring, L. Kissner, Z.N.J. Peterson, and D.X. Song, "Provable Data Possession at Untrusted Stores," Proc. 14th ACM Conf. Computer and Comm. Security, pp. 598-609, 2007.
[6] G. Ateniese, R.D. Pietro, L.V. Mancini, and G. Tsudik, "Scalable and Efficient Provable Data Possession," Proc. Fourth Int'l Conf. Security and Privacy in Comm. Netowrks (SecureComm), pp. 1-10, 2008.
[7] C.C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," Proc. 16th ACM Conf. Computer and Comm. Security, pp. 213-222, 2009.
[8] H. Shacham and B. Waters, "Compact Proofs of Retrievability," Proc. 14th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology Advances in Cryptology (ASIACRYPT '08), J. Pieprzyk, ed., pp. 90-107, 2008.
[9] H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, H. Kikuchi, A. Perrig, H.-M. Sun, and B.-Y. Yang, "A Study of User-Friendly Hash Comparison Schemes," Proc. Ann. Computer Security Applications Conf. (ACSAC), pp. 105-114, 2009.
[10] A.R. Yumerefendi and J.S. Chase, "Strong Accountability for Network Storage," Proc. Sixth USENIX Conf. File and Storage Technologies (FAST), pp. 77-92, 2007.
[11] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," Proc. 17th ACM Conf. Computer and Comm. Security, pp. 756-758, 2010.
[12] M. Xie, H. Wang, J. Yin, and X. Meng, "Integrity Auditing of Outsourced Data," Proc. 33rd Int'l Conf. Very Large Databases (VLDB), pp. 782-793, 2007.
[13] C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," Proc. IEEE INFOCOM, pp. 1-9, 2010.
[14] B. Sotomayor, R.S. Montero, I.M. Llorente, and I.T. Foster, "Virtual Infrastructure Management in Private and Hybrid Clouds," IEEE Internet Computing, vol. 13, no. 5, pp. 14-22, Sept./Oct. 2009.
[15] A. Bialecki, M. Cafarella, D. Cutting, and O. O'Malley, "Hadoop: A Framework for Running Applications on Large Clusters Built of Commodity Hardware," technical report, http://lucene.apache. orghadoop/, 2005.
[16] D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures," Proc. Advances in Cryptology (CRYPTO '04), pp. 41-55, 2004.
[17] D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Advances in Cryptology (CRYPTO '01), pp. 213-229, 2001.
[18] C.-P. Schnorr, "Efficient Signature Generation by Smart Cards," J. Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
[19] S. Goldwasser, S. Micali, and R.L. Rivest, "A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks," SIAM J. Computing, vol. 17, pp. 281-308, Apr. 1988.
[20] D. Boneh and X. Boyen, "Short Signatures without Random Oracles and the SDH Assumption in Bilinear Groups," J. Cryptology, vol. 21, pp. 149-177, Feb. 2008.
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool