Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds

Identity Based Data Outsourcing with Comprehensive Auditing in Clouds

Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


Cloud storage system provides distributed customers with facilitative file storage and sharing services. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds To address issues of integrity, controllable outsourcing, and origin auditing on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous to existing proposals in securing outsourced data.

Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds First, our IBDO scheme allows a user to authorize dedicated proxies to upload data on their behalf to the cloud storage server, e.g., a company may authorize some employees to upload files to the company’s cloud account in a controlled manner. The proxies are identified and authorized with their recognizable identities, eliminating complicated certificate management in the usual secure distributed computing systems.


  • Compared to a lot of its predecessors, which only provide binary results about the storage state across the cloud servers, the challenge-response protocol in our work more provides the localization of data error.
  • Unlike most prior works used for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append.
  • Extensive protection and act analysis demonstrate that the proposed scheme is extremely efficient and resilient beside Byzantine failure, malicious data modification attack, and even server colluding attacks.


  • Data security protection cannot be directly user’s control.
  • Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data.
  • Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety,
  • This is not just a third party data warehouse.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration
Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE


We investigated cloud storage proofs in a multi-user setting. We introduced the notion of identity-based data outsourcing and proposed a secure IBDO scheme. It allows the file owner to delegate their outsourcing capability to proxies. Only the authorized proxy can process and outsource the file on behalf of the file owner. A public auditor can verify the origin of the file and the integrity of the file.