CFP last date
20 December 2024
Reseach Article

Implementation of Efficient Audit Service Outsourcing for Data Integrity by Interfacing the Mobile Device in Clouds

by D. Kumuthavijay, J. Nandhini, V. Jayaprakasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 20
Year of Publication: 2013
Authors: D. Kumuthavijay, J. Nandhini, V. Jayaprakasan
10.5120/11509-7227

D. Kumuthavijay, J. Nandhini, V. Jayaprakasan . Implementation of Efficient Audit Service Outsourcing for Data Integrity by Interfacing the Mobile Device in Clouds. International Journal of Computer Applications. 67, 20 ( April 2013), 9-15. DOI=10.5120/11509-7227

@article{ 10.5120/11509-7227,
author = { D. Kumuthavijay, J. Nandhini, V. Jayaprakasan },
title = { Implementation of Efficient Audit Service Outsourcing for Data Integrity by Interfacing the Mobile Device in Clouds },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 20 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number20/11509-7227/ },
doi = { 10.5120/11509-7227 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:25:55.749512+05:30
%A D. Kumuthavijay
%A J. Nandhini
%A V. Jayaprakasan
%T Implementation of Efficient Audit Service Outsourcing for Data Integrity by Interfacing the Mobile Device in Clouds
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 20
%P 9-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing provide much more effective computing by centralized memory processing, storage and bandwidth. The problem in cloud computing is that they are facing a potentially formidable risk for missing or corrupted data. Third party auditor should be able to efficiently audit the cloud data storage without demanding the local copy of data. DES algorithm can use for encryption in CSP. In this paper, we propose to implement the mobile devices that can be interfaces in between the Cloud Service Provider and Third party Agent to avoid the delay in sending the modification done in the data storage to the cloud and also client's owner. Also we implement a user authentication protocol named oPass which leverages a user's cell phone and short message service (SMS) to prevent password stealing and password reuse attacks in cloud computing we demonstrate to decrease the delay through mobile device. Our simulation results for the cost, computational and communication overhead can perform more effective in cloud computing.

References
  1. Cramer, R. , Damgård, I. , MacKenzie, P. D. , 2000. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In: Public Key Cryptography, pp. 354–373.
  2. Boneh, D. , Franklin, M. , 2001. Identity-based encryption from the weil pairing. In: Advances in Cryptology (CRYPTO'2001). Vol. 2139 of LNCS, pp. 213–229.
  3. B. Ives, K. R. Walsh, and H. Schneider, "The domino effect of password reuse," Commun. ACM, vol. 47, no. 4, pp. 75–78, 2004.
  4. Yumerefendi, A. R. , Chase, J. S. , 2007. Strong accountability for network storage. ACM Trans. Storage (TOS) 3 (3).
  5. D. Florencio and C. Herley, "A large-scale study of web password habits," in WWW '07: Proc. 16th Int. Conf. World Wide Web. , New York, 2007, pp. 657–666, ACM.
  6. Ateniese, G. , Pietro, R. D. , Mancini, L. V. , Tsudik, G. , 2008. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm, pp. 1–10.
  7. Yavuz, A. A. , Ning, P. , 2009. Baf: An efficient publicly verifiable secure audit logging scheme for distributed systems. In: ACSAC, pp. 219–228.
  8. Bowers, K. D. , Juels, A. , Oprea A. ,2009. Hail: a high- availability and integrity layer for cloud storage. In: ACM Conference on Computer and Communications Security,pp. 187–198.
  9. Wang, C. , Wang, Q. , Ren, K. , Lou, W. , 2010. Privacy-preserving public auditing for Data storage security in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9, 14-19.
  10. Dodis, Y. , Vadhan, S. P. , Wichs, D. , 2009. Proofs of retrievability via hardness amplification. In: Reingold, O. (Ed. ), Theory of Cryptography, 6th Theory of Cryptography
  11. Armbrust, M. , Fox, A. , Griffith, R. , Joseph, A. D. , Katz, R. H. , Konwinski, A. , Lee, G. , Patterson, D. A. , Rabkin, A. , Stoica, I. , Zaharia, M. , 2010. A view of cloud computing. Commun. ACM 53 (4), 50–58. Conference, TCC 2009. Vol. 5444 of Lecture Notes in Computer Science. Springer, pp. 109–127.
  12. Tchifilionova, V. , 2011. Security and privacy implications of cloud computing c lost in the cloud . In Camenisch, J. , Kisimov, V Dubovitskaya. M. (Eds), Open Research Problems in Network Security. Vol. 6555 of Lecture Notes in Computer Science Springer, Berlin/Heidelberg,pp 149-158.
  13. Yan Zhua. b, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau for data integrity in clouds: The Journal of Systems and Software85 (2012) 1083-1095.
  14. Hung-Min Sun, et. al 2012. "oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks". Vol. 7, No. 7. TS 23. 040: Technical Realization Short Message Service (SMS) 3 GPP [Online].
  15. S. Chiasson, A. Forget,E. Stobert,P. C. van Oorschot, and R. Biddle,"Multiple password interference in text passwords and click-based graphical passwords," in CCS'09: proc. 16th ACM Conf. Computer Communications Security, New York, 2009, pp. 500–511, ACM.
  16. S. Gaw and E. W. Felten, "Password Management Strategies for online accounts, in SOUPS '06: PROC. 2ND SYMP. Usable Privacy. Security, New York 2006, pp. 44-55, ACM.
  17. I. T. Report, ITU Internet Rep. 2006: Digital. Life [Online]. Available: http://www. itu. int/
  18. TS 35. 201: Specification 3GPP Confidentiality Integrity Algorithms document 1: f8 and f9 Specification 3GPP [Online]. Et. al.
  19. By Earthnet: http/ earthnet. net/cloud. html, copyright from 1995-2012- Earthnet, Inc.
  20. By Eric Knorr, Galen Gruman "What Really Cloud Computing".
  21. By Williams Stallings Cryptography and Network Security principles and Practices, Fourth Edition, Publisher: Prentice hall, Pub Date: November 16, 2005, Pages: 592.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Audit Service Email alert Mobile device Security Delay oPass CSP