Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 269357, 12 pages
http://dx.doi.org/10.1155/2014/269357
Research Article

Towards Dynamic Remote Data Auditing in Computational Clouds

1Center for Mobile Cloud Computing Research (C4MCCR), University of Malaya, 50603 Kuala Lumpur, Malaysia
2Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 92144, Saudi Arabia
3Department of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, 50603 Kuala Lumpur, Malaysia

Received 14 March 2014; Accepted 8 May 2014; Published 9 July 2014

Academic Editor: Fei Yu

Copyright © 2014 Mehdi Sookhak et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Mell and T. Grance, The NIST Definition of Cloud Computing (Draft), NIST Special Publication 800, 2011.
  2. Y.-J. Chen and L.-C. Wang, “A security framework of group location-based mobile applications in cloud computing,” in Proceeding of the International Conference on Parallel Processing Workshops (ICPPW '11), pp. 184–190, Taipei, Taiwan, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloud computing,” Journal of Network and Computer Applications, vol. 40, pp. 325–344, 2014. View at Google Scholar
  4. M. Armbrust, A. Fox, R. Griffith et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” IEEE Network, vol. 24, no. 4, pp. 19–24, 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Wei, H. Zhu, Z. Cao et al., “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. M. K. Khan and J. Zhang, “Multimodal face and fingerprint biometrics authentication on space-limited tokens,” Neurocomputing, vol. 71, no. 13-15, pp. 3026–3031, 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. M. Khan and J. Zhang, “An efficient and practical fingerprint-based remote user authentication scheme with smart cards,” in Information Security Practice and Experience, K. Chen, R. Deng, X. Lai, and J. Zhou, Eds., vol. 3903 of Lecture Notes in Computer Science, pp. 260–268, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  9. N. Gohring, Amazon's S3 down for several hours, 2008, http://status.aws.amazon.com/s3-20080720.html.
  10. M. Arrington, “Gmail disaster: reports of mass email deletions,” 2006, http://techcrunch.com/2006/12/28/gmail-disaster-reports-of-mass-email-deletions/.
  11. Cellan-Jones, “The Sidekick Cloud Disaster,” http://www.bbc.co.uk/blogs/technology/2009/10/the_sidekick_cloud_disaster.html.
  12. D. Storm, Epsilon breach: hack of the century?, 2011, http://blogs.computerworld.com/18079/epsilon_breach_hack_of_the_century.
  13. M. J. Schwartz, “6 worst data breaches of 2011,” 2012, http://www.informationweek.com/news/security/attacks/232301079.
  14. G. Ateniese, R. Burns, R. Curtmola et al., “Remote data checking using provable data possession,” ACM Transactions on Information and System Security, vol. 14, no. 1, article 12, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. G. Ateniese, R. Burns, R. Curtmola et al., “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–609, Virginia, Va, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm '08), pp. 1–10, ACM, Istanbul, Turkey, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2012. View at Publisher · View at Google Scholar
  18. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 213–222, ACM, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. Q.-A. Wang, C. Wang, K. Ren, W.-J. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable storage services in cloud computing,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220–232, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. H. Wang, “Proxy provable data possession in public clouds,” IEEE Transactions on Services Computing, vol. 6, no. 4, pp. 551–559, 2012. View at Google Scholar
  22. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013. View at Publisher · View at Google Scholar
  23. Ł. Krzywiecki and M. Kutyłowski, “Proof of possession for cloud storage via lagrangian interpolation techniques,” in Network and System Security, L. Xu, E. Bertino, and Y. Mu, Eds., vol. 7645 of Lecture Notes in Computer Science, pp. 305–319, Springer, Berlin, Germany, 2012. View at Google Scholar
  24. F. Sebé, J. Domingo-Ferrer, A. Martínez-Ballesté, Y. Deswarte, and J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1034–1038, 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. A. Juels and B. S. Kaliski Jr., “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 584–597, ACM, Alexandria, VA, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  26. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Advances in Cryptology (ASIACRYPT), pp. 90–107, Springer, Berlin, Germany, 2008. View at Google Scholar
  27. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” in Advances in Cryptology (EUROCRYPT), pp. 416–432, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. D. Cash, A. Küpçü, and D. Wichs, “Dynamic proofs of retrievability via oblivious RAM,” Cryptology ePrint Archive: Report 2012/550, IACR, 2012. View at Google Scholar
  29. O. Goldreich and R. Ostrovsky, “Software protection and simulation on oblivious RAMs,” Journal of the ACM, vol. 43, no. 3, pp. 431–473, 1996. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. W. Pugh, “Skip lists: a probabilistic alternative to balanced trees,” Communications of the ACM, vol. 33, no. 6, pp. 668–676, 1990. View at Publisher · View at Google Scholar
  31. Y. Zhang and M. Blanton, “Efficient dynamic provable possession of remote data via update trees,” IACR Cryptology ePrint Archive, vol. 2012, p. 291, 2012. View at Google Scholar
  32. R. C. Merkle, “Protocols for public key cryptosystems,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 122–134, April 1980. View at Publisher · View at Google Scholar · View at Scopus
  33. D. Catalano, D. Fiore, R. Gennaro, and K. Vamvourellis, “Algebraic (trapdoor) one-way functions and their applications,” in Theory of Cryptography, A. Sahai, Ed., vol. 7785 of Lecture Notes in Computer Science, pp. 680–699, Springer, Berlin, Germany, 2013. View at Google Scholar
  34. M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server: taxonomy and open issues,” Journal of Network and Computer Applications, 2014. View at Google Scholar
  35. T. S. J. Schwarz and E. L. Miller, “Store, forget, and check: using algebraic signatures to check remotely administered storage,” in Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06), p. 12, 2006. View at Publisher · View at Google Scholar
  36. W. Litwin and T. Schwarz, “Algebraic signatures for scalable distributed data structures,” in Proceedings of the 20th International Conference on Data Engineering (ICDE '04), pp. 412–423, April 2004. View at Publisher · View at Google Scholar · View at Scopus
  37. R. Impagliazzo, L. A. Levin, and M. Luby, “Pseudo-random generation from one-way functions,” in Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing Seattle, pp. 12–24, Washington, DC, USA, May 1989. View at Scopus
  38. AWS, “Amazon Simple Storage Service (S3),” http://aws.amazon.com/s3/.
  39. D. Nurmi, R. Wolski, C. Grzegorczyk et al., “The eucalyptus open-source cloud-computing system,” in Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09), pp. 124–131, Shanghai, China, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  40. A. Broder, “Some applications of Rabin’s fingerprinting method,” in Sequences II, pp. 143–152, Springer, New York, NY, USA, 1993. View at Google Scholar