Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 820391, 10 pages
http://dx.doi.org/10.1155/2014/820391
Research Article

A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

Department of Computer Science, Korea Advanced Institute of Science and Technology (KAIST), Daejeon 305-701, Republic of Korea

Received 29 January 2014; Accepted 26 February 2014; Published 12 May 2014

Academic Editors: Y. Pan and J. J. Park

Copyright © 2014 Ohmin Kwon et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E.-H. Song, H.-W. Kim, and Y.-S. Jeong, “Visual monitoring system of multi-hosts behavior for trustworthiness with mobile cloud,” Journal of Information Processing Systems, vol. 8, no. 2, pp. 347–358, 2012. View at Publisher · View at Google Scholar
  2. J. Bringer and H. Chabanne, “Embedding edit distance to enable private keyword search,” Human-Centric Computing and Information Sciences, vol. 2, article 2, 2012. View at Publisher · View at Google Scholar
  3. Y. Pan and J. Zhang, “Parallel programming on cloud computing platforms challenges and solutions,” Journal of Convergence, vol. 3, no. 4, pp. 23–28, 2012. View at Google Scholar
  4. T. Teraoka, “Organization and exploration of heterogeneous personal data collected in daily life,” Human-Centric Computing and Information Sciences, vol. 2, article 1, no. 1, 2012. View at Publisher · View at Google Scholar
  5. J. K. Y. Ng, “Ubiquitous healthcare: healthcare systems and applications enabled by mobile and wireless technologies,” Journal of Convergence, vol. 3, no. 2, pp. 15–20, 2012. View at Google Scholar
  6. “Google: Google drive,” http://drive.google.com.
  7. “Amazon: Amazon s3,” http://aws.amazon.com/s3.
  8. G. Ateniese, R. Burns, R. Curtmola et al., “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–610, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 213–222, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  10. H. Shacham and B. Waters, “Compact proofs of retrievability,” in Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '08), pp. 90–107, Springer, 2008.
  11. C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013. View at Google Scholar
  12. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Juels and B. S. Kaliski Jr., “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security CCS '07), pp. 584–597, ACM, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013. View at Publisher · View at Google Scholar
  15. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau, “Dynamic audit services for integrity verification of outsourced storages in clouds,” in Proceedings of the 26th Annual ACM Symposium on Applied Computing (SAC '11), pp. 1550–1557, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '13), pp. 2904–2912, 2013.
  17. B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” in Proceedings of the 5th IEEE International Conference on Cloud Computing (CLOUD '12), pp. 295–302, 2012.
  18. B. Wang, B. Li, and H. Li, “Knox: privacy-preserving auditing for shared data with large groups in the cloud,” in Applied Cryptography and Network Security, F. Bao, P. Samarati, and J. Zhou, Eds., vol. 7341 of Lecture Notes in Computer Science, pp. 507–525, Springer, Berlin, Germany, 2012. View at Google Scholar
  19. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and verifiably encrypted signatures from bilinear maps,” in Proceedings of the 22nd International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT '03), pp. 416–432, Springer, 2003.
  20. K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409–428, 2012. View at Publisher · View at Google Scholar · View at Scopus