Open Access Open Access  Restricted Access Subscription Access

Enhancing Audit using Trace Logs Encrypted through User Secret Key Encryption Protocol in Multi Cloud Storage Management Application

Abirami V, Mohana A, Sarumathi V, Auxilia Osvin Nancy V

Abstract


Cloud computing is a technology for sharing the resources for on demand request and for processing the data. V Various cloud storage providers (CSP) offers free and premium cloud storage spaces. Multi cloud storage management application provides a single unified interface to access all the connected storage spaces to obtain quick accessibility removing the effort and time involved in switching between CSPs to access data hosted in different CSPs. Authenticated accessibility ensures a secured environment but provision to audit the actions performed to verify the history of actions is required for auditing to ensure the data and application integrity. Observing and registering a Trace Log for each and every actions performed by each user will facilitate and assure the process of auditing. In order to secure the Trace Logs of each user from unauthorized access of other users, encryption can be employed using user specific secret key. This approach will ensure both security and authorization for the Trace Logs.


Full Text:

PDF

References


Chenbin Zhao, Li Xu, Jiguo Li, Feng Wang, He Fang. Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage. Access IEEE. 2019.7:160459-160471p. https://ieeexplore.ieee.org/abstract/document/8889707

Feng Wang, Li Xu, Kim-Kwang Raymond Choo, Yuexin Zhang, Huaqun Wang, Jiguo Li. Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage. Access IEEE.2020.8:2258-2271p. https://ieeexplore.ieee.org/document/8936952

K. He, J. Chen, Q. Yuan, S. Ji, D. He and R. Du. Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Transactions on Dependable and Secure Computing.doi:10.1109/TDSC.2019.2925800 https://ieeexplore.ieee.org/abstract/document/8753744

He J, Zhang Z, Li M, Zhu L, Hu J. Provable data integrity of cloud storage service with enhanced security in the internet of things. IEEE Access .2018.7:6226–6239p https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8587249

Khedr WI, Khater HM, Mohamed ER. Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access.2019.65635–6565p https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8717580

Shen W, Qin J, Yu J, Hao R, Hu J. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf ForensicsSecure.2019.14(2):331–346p https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8395433

Zhang Y, Yu J, Hao R, Wang C, Ren K. Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Trans Dependable Secure Comput.2018.https://www.computer.org/csdl/journal/tq/5555/01/08345742/13rRUyeTVjt

Hunag, C. Yang, C. Weng, Y. Chen and S. Wang. Secure Protocol for Identity-based Provable Data Possession in Cloud Storage.2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), Singapore, 2019:327- 331p. doi:10.1109/CCOMS.2019. 8821766 https://ieeexplore.ieee.org/document/8821766

H. Tian, Y. Chen, H. Jiang, Y. Huang, F. Nan and Y. Chen. Public Auditing for Trusted Cloud Storage Services. IEEE Security & Privacy. Jan.-Feb.2019.17(1):20-22p. doi:10.1109/MSEC.2018.2875880 https://ieeexplore.ieee.org/document/8674178

H. Wang, D. He, A. Fu, Q. Li and Q. Wang. Provable Data Possession with Outsourced Data Transfer. IEEE Transactions on Dependable and Secure Computing. doi:10.1109/TSC.2019.2892095 https://ieeexplore.ieee.org/document/8607110


Refbacks

  • There are currently no refbacks.