Dynamic data auditing scheme for big data storage

Xingyue CHEN, Tao SHANG, Feng ZHANG, Jianwei LIU, Zhenyu GUAN

PDF(486 KB)
PDF(486 KB)
Front. Comput. Sci. ›› 2020, Vol. 14 ›› Issue (1) : 219-229. DOI: 10.1007/s11704-018-8117-6
RESEARCH ARTICLE

Dynamic data auditing scheme for big data storage

Author information +
History +

Abstract

When users store data in big data platforms, the integrity of outsourced data is a major concern for data owners due to the lack of direct control over the data. However, the existing remote data auditing schemes for big data platforms are only applicable to static data. In order to verify the integrity of dynamic data in a Hadoop big data platform, we presents a dynamic auditing scheme meeting the special requirement of Hadoop. Concretely, a new data structure, namely Data Block Index Table, is designed to support dynamic data operations on HDFS (Hadoop distributed file system), including appending, inserting, deleting, and modifying. Then combined with the MapReduce framework, a dynamic auditing algorithm is designed to audit the data on HDFS concurrently. Analysis shows that the proposed scheme is secure enough to resist forge attack, replace attack and replay attack on big data platform. It is also efficient in both computation and communication.

Keywords

big data / data security / remote data auditing / dynamic update / privacy protection

Cite this article

Download citation ▾
Xingyue CHEN, Tao SHANG, Feng ZHANG, Jianwei LIU, Zhenyu GUAN. Dynamic data auditing scheme for big data storage. Front. Comput. Sci., 2020, 14(1): 219‒229 https://doi.org/10.1007/s11704-018-8117-6

References

[1]
Chaudhary R, Aujla G S, Garg S, Kumar N, Rodrigues J. SDN-enabled multi-attribute-based secure communication for smart grid in IIoT environment. IEEE Transactions on Industrial Informatics, 2018, 14(6): 2629–2640
CrossRef Google scholar
[2]
Chaudhary R, Aujla G S, Kumar N, Rodrigues J. Optimized big data management across multi-cloud data centers: software-definednetwork-based analysis. IEEE Communications Magazine, 2018, 56(2): 118–126
CrossRef Google scholar
[3]
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. 2007, 598–609
CrossRef Google scholar
[4]
Ateniese G, Pietro R D, Mancini L V, Tsudik G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks Conference. 2008
[5]
Juels A, Kaliski B S. PORS: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communication Security Conference. 2007, 584–597
CrossRef Google scholar
[6]
Shacham H, Waters B. Compact proofs of retrievability. In: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security. 2008, 90–107
CrossRef Google scholar
[7]
Erway C, Kupcu A, Papamanthou C, Tamassia R. Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer Communication Security. 2009, 213–222
CrossRef Google scholar
[8]
Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of European Symposium on Research in Computer Security. 2009, 355–370
CrossRef Google scholar
[9]
Wang C, Wang Q, Ren K, Lou W. Privacy-preserving public auditing for data storage security in cloud computing. In: Proceedings of the 29th Conference on Information Communications. 2010, 1–9
CrossRef Google scholar
[10]
Wang Q, Wang C, Ren K, Lou W, Li J. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847–859
CrossRef Google scholar
[11]
Zhu Y, Hu H, Ahn G J, Yu M. Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(12): 2231–2243
CrossRef Google scholar
[12]
Zhu Y, Ahn G J, Hu H, Yau S S, An H G, Hu C J. Dynamic audit services for outsourced storages in clouds. IEEE Transactions on Services Computing, 2012, 6(2): 227–238
[13]
Li J, Xie D, Cai Z. Secure auditing and deduplicating data in cloud. IEEE Transactions on Computers, 2016, 65(8): 2386–2396
CrossRef Google scholar
[14]
Sookhak M, Akhunzada A, Gani A, Khan M K, Anuar N B. Towards dynamic remote data auditing in computational clouds. The Scientific World Journal, 2014, 2014: 269357
[15]
Yang K, Jia X. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(9): 1717–1726
CrossRef Google scholar
[16]
Aujla G S, Chaudhary R, Kumar N, Das A K, Rodrigues J. SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Communications Magazine, 2018, 56(1): 78–85
CrossRef Google scholar
[17]
Garg N, Bawa S. RITS-MHT: relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. Journal of Network and Computer Applications, 2017, 84: 1–13
CrossRef Google scholar
[18]
Chen X, Li J, Weng J, Ma J, Lou W. Verifiable computation over large database with incremental updates. IEEE Transactions on Computers, 2016, 65(10): 3184–3195
CrossRef Google scholar
[19]
Chen X, Li J, Huang X, Ma J, Lou W. New publicly verifiable databases with efficient updates. IEEE Transactions on Dependable and Secure Computing, 2015, 12(5): 546–556
CrossRef Google scholar

RIGHTS & PERMISSIONS

2018 Higher Education Press and Springer-Verlag GmbH Germany, part of Springer Nature
AI Summary AI Mindmap
PDF(486 KB)

Accesses

Citations

Detail

Sections
Recommended

/