Abstract
Data storage of cloud services has increased rates of acceptance due to their flexibility and the concern of the security and confidentiality levels. Many of the integrity and security problems raised based on the differences between client and service provider for resolution of third-party auditor. This review paper gives a brief view of current data integrity and security issues in the distributed cloud computing environment. The paper compared eight different models of the cloud data integrity and security. It highlights nearly solutions for some of the current cloud security risks and challenges by summarizing the key schemes of the privacy-preserving public auditing, particularly access control, attribute-based access control, and public key encryption. Moreover, the paper assigning the existing models, algorithms, and methodologies of data integrity and security had done in the literature of distributed cloud security. It suggested further research in cloud security domain regarding many of the security and data integrity issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese G, Burns R, Curtmola R et al (2007) Provable data possession at untrusted stored. In: Proceedings of the 14th ACM conference on computer and communications security. ACM, New York, pp 598–609
Shah MA, Baker M, Mogul JC, Swaminathan R (2007) Auditing to keep online storage services honest. In: HOTOS’07: proceedings of the 11th USENIX workshop on hot topics in operating systems, Berkeley, CA, USA, pp 1–6
Erway C, Küpçü A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of 16th ACM conference on computer and communication security (CCS), New York, NY, USA, pp 213–222
Hao Z, Zhong S, Yu N (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437
Barsoum AF, Hasan MA (2011) On verifying dynamic multiple data copies over cloud servers. In: Cryptology ePrint Archive, Report 2011/447. http://eprint.iacr.org/
Juels A, Kaliski BS Jr (2007) PORs: proofs of retrievability for large files. In: Proceedings of CCS. ACM, pp 583–597
Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proceedings of ASIACRYPT. Springer, pp 90–107
Wang C, Chow SS, Wang Q, Ren K, Lou W (2013) Privacypreserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) SCLPV: secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans Comput Soc Syst 2(4):159–170
Sookhak M, Gani A, Talebian H, Akhunzada A, Khan SU, Buyya R, Zomaya AY (2015) Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput Surv 47(4):159–170
Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of SecureComm. ACM
Shi E, Stefanov E, Papamanthou C (2013) Practical dynamic proofs of retrievability. In: Proceedings of CCS. ACM, pp 325–336
Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726
Sookhak M, Gani A, Khan MK, Buyya R. Dynamic remote data auditing for securing big data storage in cloud computing (to appear). https://doi.org/10.1016/j.ins.2015.09.004
Wang C, Wang Q, Ren K, Lou W (2010) Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 proceedings IEEE. IEEE, pp 1–9
Wang C, Chow SSM, Wang Q, Ren K, Lou W. Privacy preserving public auditing for secure cloud storage. http://eprint.iacr.org/2009/579.pdf
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232
Worku SG, Xu C, Zhao J, He X (2014) Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput Electr Eng 40(5):1703–1713
Meenakshi IK, George S (2014) Cloud server storage security using TPA. Int J Adv Res Comput Sci Technol (IJARCST). ISSN: 2347-9817
Tejaswini KS, Prashanth SK (2013) Privacy preserving and public auditing service for data storage in cloud computing. Indian J Res PARIPEX 2(2)
Santosh J, Nandwalkar BR. Privacy preserving and batch auditing in secure cloud data storage using AES. In: Proceedings of 13th IRF international conference. ISBN: 978-93-84209-37-72014
Ezhil Arasu S, Gowri B, Ananthi S (2013) Privacy-preserving public auditing in cloud using HMAC algorithm. Int J Recent Technol Eng (IJRTE). ISSN: 2277, 3878
Wang C, Wang Q, Ren K, Cao N, Lou W (2011) Towards secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220–232
Morea S, Chaudhari S (2016) Third party public auditing scheme for cloud storage. Int J Procedia Comput Sci 79:69–76
Berger S, Garion S, Moatti Y, Naor D, Pendarakis D, ShulmanPeleg A, Rao JR, Valdez E, Weinsberg Y (2016) Security intelligence for cloud management infrastructures. IBM J Res Dev 60(4):11:1–11:13
Secure access control for cloud storage. https://www.research.ibm.com/haifa/projects/storage/cloudstorage/secureaccess.shtml
Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO 2005. LNCS, vol 3621, pp 258–275
Ateniese G, Fu K, Green M, Hohenberger S (2006) Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur 9(1):1–30
Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure rolebased access control on encrypted data in cloud storage. IEEE Trans Inf Forensics Secur 8(12):1947–1960
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, pp 89–98
Hu VC, Kuhn DR, Ferraiolo DF (2015) Attribute-based access control. IEEE Comput 48(2):85–88
Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: PKC 2011. LNCS, vol 6571, pp 90–108
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), pp 321–334
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC 2011, LNCS, vol 6571, pp 53–70
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. INFOCOM 2010:534–542
Huang J, Chiang C, Liao I (2013) An efficient attribute-based encryption and access control scheme for cloud storage environment. In: Grid and pervasive computing GPC 2013, LNCS, vol 7861, pp 453–463
Wang G, Liu Q, Wu J (2010) Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM conference on computer and communications security, CCS 2010, pp 735–737
Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inf Forensics Secur 7(2):743–754
Wu Y, Wei Z, Deng RH (2013) Attribute-based access to scalable media in cloud-assisted content sharing networks. IEEE Trans Multimedia 15(4):778–788
Hur J (2013) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282
Sahai HS, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: CRYPTO 2012. LNCS, vol 7417, pp 199–217
Yang K, Jia X, Ren K (2015) Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans Parallel Distrib Syst 26(12):3461–3470
Liang K, Fang L, Wong DS, Susilo W (2015) A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency Comput Pract Experience 27(8):2004–2027
Yang G, Tan CH, Huang Q, Wong DS (2010) Probabilistic public key encryption with equality test. In: Topics in cryptology—CT-RSA 2010. LNCS, vol 5985, pp 119–131
Tang Q (2011) Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Information security and privacy—16th Australasian conference, ACISP 2011. LNCS, vol 6812, pp 389–406
Tang Q (2012) Public key encryption schemes supporting equality test with authorisation of different granularity. IJACT 2(4):304–321
Wang H (2015) Identity-based distributed provable data possession in multicloud storage. IEEE Trans Serv Comput 8(2):328–340
Curtmola R, Khan O, Burns R et al (2008) MR-PDP: multiple-replica provable data possession. In: The international conference on distributed computing systems. IEEE Computer Society, pp 411–420
Guan C, Ren K, Zhang F, Kerschbaum F, Yu J (2015) Symmetric key based proofs of retrievability supporting public verification. In: Computer security—ESORICS. Springer, Cham, Switzerland, pp 203–223
Shen W, Yu J, Xia H, Zhang H, Lu X, Hao R (2017) Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J Netw Comput Appl 82:56–64
Yu J, Ren K, Wang C, Varadharajan V (2015) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167–1179
Yu J, Ren K, Wang C (2016) Enabling cloud storage auditing with verifiable outsourcing of key updates. IEEE Trans Inf Forensics Secur 11(6):1362–1375
Yu J, Wang H (2017) Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans Inf Forensics Secur 12(8):1931–1940
Yu J, Hao R, Xia H, Zhang H, Cheng X, Kong F (2018) Intrusion resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf Sci 442–443:158–172
Wang B, Li B, Li H (2012) Oruta: privacy-preserving public auditing for shared data in the cloud. In: Proceedings of IEEE 5th international conference on cloud computing (CLOUD), pp 295–302
Yang G, Yu J, Shen W, Su Q, Fu Z, Hao R (2016) Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J Syst Softw 113:130–139
Fu A, Yu S, Zhang Y, Wang H, Huang C. NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans Big Data (to be published). https://doi.org/10.1109/tbdata.2017.2701347
Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106
Luo Y, Xu M, Fu S, Wang D, Deng J (2015) Efficient integrity auditing for shared data in the cloud with secure user revocation. In: Proceedings of IEEE Trustcom/BigDataSE/ISPA, pp 434–442
Wang H, He D, Tang S (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176
Yu Y et al (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778
Wang H, He D, Yu J, Wang Z. Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans Serv Comput (to be published) https://doi.org/10.1109/tsc.2016.2633260
Zhang Y, Yu J, Hao R, Wang C, Ren K. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Depend Secure Comput (to be published). https://doi.org/10.1109/tdsc.2018.2829880
Shen W, Yang G, Yu J, Zhang H, Kong F, Hao R (2017) Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener Comput Syst 76:136–145
Li J, Li J, Xie D, Cai Z (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396
Hur J, Koo D, Shin Y, Kang K (2016) Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans Knowl Data Eng 28(11):3113–3125
Ateniese G, Burns R, Curtmola R (2011) Remote data checking using provable data possession. ACM Trans Inf Syst Secur 14(1):12
Merkle RC (1980) Protocols for public key cryptosystems. In: IEEE symposium on security & privacy, issue 3, pp 122–122
Kamara S, Lauter K (2010) Cryptographic cloud storage. In: International conference on financial cryptograpy and data security. Springer, pp 136–149
Itani W, Kayssi A, Chehab A (2010) Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: International conference on energy aware computing. IEEE, Cairo, pp 1–2
Bellare M, Ran C, Krawczyk H (1996) Message authentication using hash functions—the HMAC construction. Cryptobytes 2
Yang K, Jia X, Ren K (2013) DAC-MACS: effective data access control for multi-authority cloud storage systems. In: INFOCOM, 2013 proceedings IEEE. IEEE, Turin, pp 2895–2903
Hong J, Xue K, Li W (2017) Comments on “DAC-MACS: effective data access control for multiauthority cloud storage systems”/Security analysis of attribute revocation in multiauthority data access control for cloud storage systems. IEEE Trans Inf Forensics Secur 10(6):1315–1317
Wang H, Domingo-Ferrer J, Wu Q, Qin B (2014) Identity-based remote data possession checking in public clouds. IET Inf Secur 8(2):114–121
Tan S, Jia Y (2014) NaEPASC: a novel and efficient public auditing scheme for cloud data. Front Inf Technol Electron Eng 15(9):794–804
Li J, Li J, Chen X (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437
Li Y, Yu Y, Min G (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secure Comput (99):1
Yu Y, Xue L, Man HA, Susilo W, Ni J, Zhang Y et al (2016) Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener Comput Syst 62(C):85–91
Deswarte Y, Quisquater JJ, Saïdane A (2004) Remote integrity checking. In: Proceedings of 5th working conference on integrity international control in information system (IICIS), pp 1–11
Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319
Tian H et al (2017) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10(5):701–714
Peng S, Zhou F, Wang Q, Xu Z, Xu J (2017) Identity-based public multi-replica provable data possession. IEEE Access 5:26990–27001
Shen W, Qin J, Yu J, Hao R, Hu J (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331–346
Zhu Y, Hu HX, Ahn G-J, Yu M (2012) Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst 23(12):2231–2244
Liu C, Ranjan R, Yang C, Zhang X, Wang L, Chen J (2015) MuRDPA: top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans Comput 64(9):2609–2622
Hwang G-H, Chen H-F (2016) Efficient real-time auditing and proof of violation for cloud storage systems. In: Proceedings of IEEE 9th international conference on cloud computing (CLOUD), pp 132–139
Jin H, Jiang H, Zhou K (2018) Dynamic and public auditing with fair arbitration for cloud data. IEEE Trans Cloud Comput 6(3):680–693
Küpçü A (2015) Official arbitration with secure cloud storage application. Comput J 58(4):831–852
Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082–2090
Zhou J, Sun W, Dong L, Liu X, Au OC, Tang YY (2016) Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans Circuits Syst Video Technol 26(3):441–452
Singh P, Raman B (2018) Reversible data hiding based on Shamir’s secret sharing for color images over cloud. Inf Sci 422:77–97
Honsinger CW, Jones PW, Rabbani M, Stoffel JC (2001) Lossless recovery of an original image containing embedded data. U.S. Patent 6 278 791 B1, 21 Aug 2001
Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896
Kim S, Qu X, Sachnev V, Kim HJ. Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Trans Circuits Syst Video Technol (to be published). https://doi.org/10.1109/tcsvt.2018.2878932
Pan W, Coatrieux G, Cuppens N, Cuppens F, Roux C (2010) An additive and lossless watermarking method based on invariant image approximation and Haar wavelet transform. In: Proceedings of annual international conference IEEE engineering in medicine and biology (EMBC), 2010, pp 4740–4743
Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120
Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans Inf Forensics Secur 6(3):873–882
Ou B, Li X, Zhao Y, Ni R, Shi Y-Q (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010–5021
Dragoi I-C, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25(5):2420–2422
Wu HZ, Wang W, Dong J, Wang HX (2018) Ensemble reversible data hiding. In: Proceedings of 24th international conference on pattern recognition (ICPR), pp 1–6
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ghallab, A., Saif, M.H., Mohsen, A. (2021). Data Integrity and Security in Distributed Cloud Computing—A Review. In: Gunjan, V.K., Zurada, J.M. (eds) Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Advances in Intelligent Systems and Computing, vol 1245. Springer, Singapore. https://doi.org/10.1007/978-981-15-7234-0_73
Download citation
DOI: https://doi.org/10.1007/978-981-15-7234-0_73
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7233-3
Online ISBN: 978-981-15-7234-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)