Towards Efficient ECC Based Provable Data Possession Protocol with Data Dynamics for Secure Cloud Storage
D. Sudha Devi1, K. Thilagavathy2
1D. Sudha Devi, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India.
2Dr. K. Thilagavathy, Coimbatore Institute of Technology, Coimbatore, Tamil Nadu, India.
Manuscript received on January 22, 2016. | Revised Manuscript received on January 30, 2016. | Manuscript published on March 05, 2016. | PP: 21-27 | Volume-6 Issue-1, March 2016. | Retrieval Number: A2796036116/2016©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cloud Computing is acquainted for its cost-effective on-demand services based on internet. The significant benefits of cloud services drive organizations and individuals to make hay by outsourcing data to cloud storages. Outsourcing data brings users’ an easy and economical way of data management and also relieves users’ from the burden of building and maintaining local data storage. However, data being residing in some third-party’s premises, users have no full control over their data which necessitates ensuring confidentiality and integrity of data stored in untrusted cloud storage servers. To verify the correctness of data in cloud storage, this paper proposes an efficient ECC based Provable Data Possession (EPDP) Protocol with data dynamics. The proposed protocol preserves confidentiality of data stored in cloud storage and allows data owner to verify the integrity of data without retrieving the whole original data. Also the protocol is designed to perform stateless auditing and supports data dynamics at block level retaining the same security assurance. Security and Performance analysis proves the proposed protocol to be secure and highly efficient for secure cloud storage.
Keywords: Confidentiality, cloud data storage, data integrity, elliptic curve cryptography, integrity verification, secure storage