Open Access Open Access  Restricted Access Subscription or Fee Access

Multi Key Word Search and Trusted Auditing System to Verify the Integrity of Outsourced Data in Cloud Computing


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i10.3710

Abstract


Cloud computing provide the owner to store their data into the cloud servers and data consumers can access the data from cloud by on demand. By outsourcing the data, the owners can no need to maintain the data locally. Due to this, the owner requires the auditing service to verify the correctness of the data stored in the cloud servers. To reduce the communication cost the server should return only the relevance files while the user request for the data files.  Sharing relevance data and checking the integrity of the outsourced data is still a challenging issue. Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to certain relevance criteria .Our proposed system is developed based on the fragment structure , hash index hierarchy and top n query algorithm to retrieve the n number of best matched results for the given query. In addition we provide a load balancing scheme to process the jobs submitted to the server. Our experimental results prove that the proposed system is highly efficient and secured.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Cloud Computing; Load Balancing; Multi Keyword Search; Trusted Auditing

Full Text:

PDF


References


M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
http://dx.doi.org/10.1145/1721654.1721672

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 29-43, 2005.
http://dx.doi.org/10.1145/1127345.1127346

E. Goh, H. Shacham, N. Modadugu, and D. Boneh, “Sirius: Securing Remote Untrusted Storage,” Proc. Network and Distributed Systems Security Symp. (NDSS), pp. 131-145, 2003.

R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. ACM Symp. Information, Computer and Comm.Security, pp. 282-292, 2010.
http://dx.doi.org/10.1145/1755688.1755723

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, “Plutus: Scalable Secure File Sharing on Untrusted Storage,” Proc. USENIX Conf. File and Storage Technologies, pp. 29-42, 2003.

S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. Int’l Conf. Financial Cryptography and Data Security (FC), pp. 136- 149, Jan. 2010.
http://dx.doi.org/10.1007/978-3-642-14992-4_13

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
http://dx.doi.org/10.1109/tpds.2010.183

B. Waters, “Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization,” Proc. Int’l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography, http://eprint.iacr.org/2008/290.pdf, 2008.
http://dx.doi.org/10.1007/978-3-642-19379-8_4

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, pp. 534-542, 2010
http://dx.doi.org/10.1109/infcom.2010.5462174

Jiadi Yu, Member, IEEE, Peng Lu, Yanmin Zhu, Member, IEEE,Guangtao Xue, Member, Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data , IEEE Computer Society, and Minglu Li IEEE VOL. 10, NO. 4, JULY/AUGUST 2013
http://dx.doi.org/10.1109/tdsc.2013.9

M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A.Konwinski, G. Lee, D. Patterson, A. Rabkin, and M. Zaharia, “AView of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58,2010.
http://dx.doi.org/10.1145/1721654.1721672

K. Nigam, A.K. McCallum, S. Thrun, and T.M. Mitchel, “Text Classification from Labeled and Unlabeled Documents Using Em,” J. Machine Learning, vol. 39, no. 2, pp. 103-134, 2000

T. J. E. Schwarz and E. L. Miller, “Store, forget, and check: Using algebraic signatures to check remotely administered storage,” in ICDCS. IEEE Computer Society, 2006, p. 12.
http://dx.doi.org/10.1109/icdcs.2006.80

D. L. G. Filho and P. S. L. M. Barreto, “Demonstrating data possession and uncheatable data transfer,” IACR Cryptology ePrint Archive, vol. 2006, p. 150, 2006.

F. Seb´e, J. Domingo-Ferrer, A. Mart´ınez-Ballest´e, Y. Deswarte, and J.-J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no. 8, pp. 1034–1038, 2008.
http://dx.doi.org/10.1109/tkde.2007.190647

Jena, R.K., Mahanti, P.K., Computing in the cloud: Concept and trends, (2011) International Review on Computers and Software (IRECOS), 6 (1), pp. 1-10.

Jena, R.K., Green cloud computing: Need of the hour, (2012) International Review on Computers and Software (IRECOS), 7 (1), pp. 45-52.

Xiao, P., Yan, G., Liu, D., Qu, X., A reliable-enhanced cloud storage framework for mobile computing environments, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 586-592.

Lai, C.-Y., Shih, D.-H., Chiang, H.-S., Chen, C.-C., A study of cloud computing affecting switch intentions of information service in junior and elementary schools, (2011) International Review on Computers and Software (IRECOS), 6 (3), pp. 371-383.

Alsaih, M.A., Latip, R., Abdullah, A., Subramaniam, S.K., A taxonomy of load balancing techniques in cloud computing, (2013) International Review on Computers and Software (IRECOS), 8 (1), pp. 64-76.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize