
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
Abstract
Cloud storage system provides distributed customers with facilitative file storage and sharing services. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds To address issues of integrity, controllable outsourcing, and origin auditing on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous to existing proposals in securing outsourced data.
Advantages
- Compared to a lot of its predecessors, which only provide binary results about the storage state across the cloud servers, the challenge-response protocol in our work more provides the localization of data error.
- Unlike most prior works used for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append.
- Extensive protection and act analysis demonstrate that the proposed scheme is extremely efficient and resilient beside Byzantine failure, malicious data modification attack, and even server colluding attacks.
Disadvantage
- Data security protection cannot be directly user’s control.
- Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data.
- Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety,
- This is not just a third party data warehouse.
System Configuration
Conclusion
We investigated cloud storage proofs in a multi-user setting. We introduced the notion of identity-based data outsourcing and proposed a secure IBDO scheme. It allows the file owner to delegate their outsourcing capability to proxies. Only the authorized proxy can process and outsource the file on behalf of the file owner. A public auditor can verify the origin of the file and the integrity of the file.