Data Integrity Auditing Without Private Key Storage For Secure Cloud Storage
Data Integrity Auditing Without Private Key Storage For Secure Cloud Storage
Data Integrity Auditing Without Private Key Storage For Secure Cloud Storage
ABSTRACT
Utilizing distributed storage administrations, clients can store their Information in the cloud to maintain a strategic distance from
the consumption of neighborhood information stockpiling support. To guarantee the uprightness of the information put away in
the Cloud, numerous information, honesty examining plans have been proposed. A client needs to Utilize his private key to
produce the information authenticators for Understanding the information respectability reviewing. In this way, the client needs to
have an equipment token to store his private Key and retain a secret phrase to enact this private key. In the event that this
Equipment token is lost or this secret phrase is overlooked, the majority of the Current information, trustworthiness inspecting
plans would be notable work. We propose another worldview Called information uprightness inspecting without private key
stockpiling and Plan such a plan. In this plan, we use biometric informationas the client's fluffy private key to Abstain from
utilizing the equipment token. In the interim, the plan can at present Successfully complete the information respectability
auditing. We use a direct Sketch with coding and blunder revision procedures to affirm The personality of the client. We use
another mark Conspire which supports blacklist certainty. The security evidence and the Execution examination demonstrates that
our proposed plan accomplishes Attractive security andeffectiveness.
Keywords: Cloud storage, Data integrity auditing, Data security, Biometric data.
sk is calculated as c = m + sk. The one-time pad encryption for cloud computing,” Journal of Network & Computer
scheme satisfied the following property. For two ciphertexts Applications,vol.84,pp.1–13,2017.
c = m + sk and c 0 = m0 + sk with the same key sk, the
[5] H. Jin, H. Jiang, and K. Zhou, “Dynamic and public
“difference” 4m= m − m0 of plaintexts can be computed by
auditing with fair arbitration for cloud data,” IEEE Trans-
comparing c and c 0 . In the designed linear sketch scheme,
actions on Cloud Computing, vol. 13, no. 9, pp. 1–14,
we make use of the above one-time pad encryption’s
2014.
property. Thus, the process of coding in the linear sketch
scheme can be viewed as the process of one-way encryption [6] S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and
in the one-time pad encryption scheme, which is used to efficient privacy-preserving public auditing scheme for
code the biometric data with a random value. cloud storage,” Comput. Electr. Eng., vol. 40, no. 5, pp.
1703–1713, Jul.2014.
[7] B. Wang, B. Li, and H. Li, “Knox: privacy-preserving
auditing for shared data with large groups in the cloud,” in
International Conference on Applied Cryptography and
Network Security,2012,pp.507–525.
[8] B. Wang, H. Li, and M. Li, “Privacy-preserving pub-
lic auditing for shared cloud data supporting group
dynamics,” in 2013 IEEE International Conference on
Communications (ICC), June 2013, pp. 1946–1950.
[9] J. Yu, K. Ren, C. Wang, and V. Varadharajan,
Fig. 2. An overview of data integrity auditing scheme without “Enabling cloud storage auditing with key-exposure
private key storage resistance,” IEEE Transactions on Information Forensics
4. Conclusion and Secu- rity,vol.10,no.6,pp.1167–1179,2015.
[10] J. Yu, K. Ren, and C. Wang, “Enabling cloud storage
In this paper, we explore how to employ fuzzy auditing with verifiable outsourcing of key updates,” IEEE
private key to realize data integrity auditing without storing Transactions on Information Forensics and Secu- rity, vol.
private key. We propose the first practical data integrity 11, no. 6, pp. 1362–1375, June 2016.
auditing scheme without private key storage for secure
cloud storage. In the proposed scheme, we utilize biometric [11] J. Yu and H. Wang, “Strong key-exposure resilient au-
data (e.g. fingerprint, iris scan) as user’s fuzzy private key diting for secure cloud storage,” IEEE Transactions on
to achieve data integrity auditing without private key Information Forensics and Security, vol. 12, no. 8, pp.
storage. In addition, we design a signature scheme 1931–1940, Aug2017.
supporting blockless verifiability and the compatibility with [12] H. Wang, Q. Wu, B. Qin, and J. Domingo-Ferrer,
the linear sketch. The formal security proof and the “Identity-based remote data possession checking in pub- lic
performance analysis show that our proposed scheme is clouds,” IET Information Security, vol. 8, no. 2, pp. 114–
provably secure and efficient. 121, March2014.
5.REFERENCES
[13] H. Wang, D. He, and S. Tang, “Identity-based proxy-
[1] H. Dewan and R. C. Hansdah, “A survey of oriented data uploading and remote data integrity check-
cloudstorage facilities,” in 2011 IEEE World Congress on ing in public cloud,” IEEE Transactions on Information
Services, July 2011, pp.224–231. Forensics and Security, vol. 11, no. 6, pp. 1165–1176,
[2] K. Ren, C. Wang, and Q. Wang, “Security challenges June2016.
for the public cloud,” IEEE Internet Computing, vol. 16,
[14] W. Shen, G. Yang, J. Yu, H. Zhang, F. Kong,and R.
no.1,pp.69–73,Jan2012.
Hao, “Remote data possession checking with privacy-
[3] A. F. Barsoum and M. A. Hasan, “Provable multicopy preserving authenticators for cloud storage,” Future Gen-
dynamic data possession in cloud computing systems,” eration Computer Systems, vol. 76, no. Supplement C, pp.
IEEE Transactions on Information Forensics and Secu- 136 – 145, 2017.
rity,vol.10,no.3,pp.485–497,March2015. [15] C. Ellison and B. Schneier, “Ten risks of pki: What
you’re not being told about public key infrastructure,” vol.
[4] N. Garg and S. Bawa, “Rits-mht: Relative indexed and
16, no. 1, 12 2000.
time stamped merkle hash tree based data auditing protocol
www.trendytechjournals.com
7