User-Level Runtime Security Auditing for the Cloud
We propose a privacy-preserving mechanism that supports public auditing on shared data stored in the cloud.
In this paper, we propose a privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one.
The propose system a privacy-preserving publicauditing mechanism for shared data in the cloud. Weutilize ring signatures to construct homomorphism authenticators, so that a public verifier is able to audit shared dataintegrity without retrieving the entire data, yet it cannotdistinguish who is the signer on each block. To improve the efficiency of verifying multiple auditing tasks, we furtherextend our mechanism to support batch auditing.There are two interesting problems we will continue tostudy for our future work. One of them is traceability,which means the ability for the group manager to reveal the identity of the signer based on verification metadata in some special situations
The existing mechanism a new significant privacy issue introduced in the case of shared data with the use of the leakage of identity privacy to public verifiers.The traditional approach forchecking data correctnessis to retrieve the entire data from the cloud, and then verifydata symmetric keys by checking the correctness of signatures.
To securely introduce an effective third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to efficiently audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should bring in no new vulnerabilities towards user dataprivacy
- As users no longer physically possess the storage of their data, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted.
- They do not perform the multiple auditing tasks in simultaneously.
The propose system, a privacy-preserving publicauditing mechanism for shared data in the cloud. Weutilize ring signatures to construct homomorphism authenticators, so that a public verifier is able to audit shared dataintegrity without retrieving the entire data, yet it cannotdistinguish who is the signer on each block.
To improvethe efficiency of verifying multiple auditing tasks, we furtherextend our mechanism to support batch auditing.There are two interesting problems we will continue tostudy for our future work. One of them is traceability,which means the ability for the group manager to reveal the identity of the signer based on verification metadata in some special situations
- The proposed system can perform multiple auditing tasks simultaneously
- They improve the efficiency of verification for multiple auditing tasks.
- High security provide for file sharing.
User-Level Runtime Security Auditing for the Cloud
Hardware And Software Specification:
- Language – Java(JDK 1.7)
- OS – Windows 7 32bit
- MySql Server
- NetBeans IDE 7.1.2
- 1 GB RAM
- 80 GB Hard Disk
- Above 2GHz Processor
- Data Card
The advent of the cloud computing makes storage outsourcing becomes a rising trend that promotes the secure remote data auditing a hot topic that appeared within the analysis literature. Recently some analysiscontemplates the problemof secure and economicalpublic information integrity auditing for shared dynamic information. However, these schemes area unit still not secure against the collusion of cloud storage server and revoked cluster users throughout user revocation in practical cloud storage system. During this paper, we have a tendency to discover the collusion attack within the exiting theme and supply associate economical public integrity auditing theme with secure cluster user revocation primarily basedon vector commitment and verifier-local revocation cluster signature. We style a concrete theme supported our theme definition. Our theme supports the general public checking and economical user revocationand additionally some nice properties, like with confidence, efficiency, count ability and traceability of secure cluster user revocation. Finally, the security and experimental analysis show that compared with its relevant themes our scheme is additionally secure and economical.
0.00 average based on 0 ratings
More Things You Might Like This
Abstract: Although the educational level of the Portuguese population has improved in the last decades, the statistics keep Portugal at Europe’s tail end due to its high student failure rates. In particular, lack of success in the core classes of Mathematics and the Portuguese language is extremely serious. On the other hand, the fields of
Abstract: Advances in natural language processing (NLP) and educational technology, as well as the availability of unprecedented amounts of educationally-relevant text and speech data, have led to an increasing interest in using NLP to address the needs of teachers and students. Educational applications differ in many ways, however, from the types of applications for which
Machine Learning based Regression Model for Prediction of Soil Surface Humidity over Moderately Vegetated Fields
Abstract: Agriculture is one of the major revenue producing sectors of India and a source of survival. Numerous seasonal, economic and biological patterns influence the crop production but unpredictable changes in these patterns lead to a great loss to farmers. These risks can be reduced when suitable approaches are employed on data related to soil