Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage - 2015

Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Research paper on Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Research Area:  Cloud Security

Abstract:

To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Recently, regenerating codes have gained popularity due to their lower repair bandwidth while providing fault tolerance. Existing remote checking methods for regenerating-coded data only provide private auditing, requiring data owners to always stay online and handle auditing, as well as repairing, which is sometimes impractical. In this paper, we propose a public auditing scheme for the regenerating-code-based cloud storage. To solve the regeneration problem of failed authenticators in the absence of data owners, we introduce a proxy, which is privileged to regenerate the authenticators, into the traditional public auditing system model. Moreover, we design a novel public verifiable authenticator, which is generated by a couple of keys and can be regenerated using partial keys. Thus, our scheme can completely release data owners from online burden. In addition, we randomize the encode coefficients with a pseudorandom function to preserve data privacy. Extensive security analysis shows that our scheme is provable secure under random oracle model and experimental evaluation indicates that our scheme is highly efficient and can be feasibly integrated into the regenerating-code-based cloud storage.

Keywords:  
Cloud storage
regenerating codes
public audit
privacy preserving
authenticator regeneration
proxy
privileged
provable secure

Author(s) Name:  Jian Liu; Kun Huang; Hong Rong; Huimei Wang; Ming Xian

Journal name:  IEEE Transactions on Information Forensics and Security

Conferrence name:  

Publisher name:  IEEE

DOI:  10.1109/TIFS.2015.2416688

Volume Information:  ( Volume: 10, Issue: 7, July 2015) Page(s): 1513 - 1528