Thursday 28th of March 2024
 

An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing


Syam Kumar P and Subramanian R

Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP) who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. The previously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our design is based on Elliptic Curve Cryptography and Sobol Sequence (random sampling). Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. It generates probabilistic proofs of integrity by challenging random sets of blocks from the server, which drastically reduces the communication and I/O costs. The challenge-response protocol transmits a small, constant amount of data, which minimizes network communication. Most importantly, our protocol is confidential: it never reveals the data contents to the malicious parties. The proposed scheme also considers the dynamic data operations at block level while maintaining the same security assurance. Our solution removes the burden of verification from the user, alleviates both the user€™s and storage service€™s fear about data leakage and data corruptions. Through security analysis, we prove that our method is secure and through performance and experimental results, we also prove that our method is efficient. To compare with existing schemes, our scheme is more secure and efficient.

Keywords: data storage, integrity, confidentiality, Elliptive Curve Cryptography(ECC), Sobol Sequence, Cloud Computing

Download Full-Text


ABOUT THE AUTHORS

Syam Kumar P
1P Syam Kumar: is currently Ph.D student (Computer Science), in department of Computer Science, School of Engineering and technology, Pondicherry University, Puducherry, India. He received M.Tech Degree in 2006 from the department of Computer Science and Technology in Andhra University, India, and received B.Tech (graduation) in 2003 from CSE department, Vagdevi college of Engineering, JNTU Warangal, India. He is especially interested on Network Security, Cloud Computing, Distributed Systems etc.

Subramanian R
2R. Subramanian: is Professor of Computer Science department, School of Engineering and technology, Pondicherry University, Puducherry, India. He received his Ph.D degree of The Department of Mathematics, IIT Delhi, India in 1989. He received a M.Sc . degree in 1984 from IIT Delhi, India and he received B.Sc. form Madurai Kamaraj University in 1982, Tamilanadu, India. He is especially interested in Parallel & Distributed Algorithms, Cloud Computing, Evolutionary Algorithms, Robotics, etc.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »