An Improved Authenticator Based Public Auditing Scheme in Cloud Storage

Main Article Content

Muhammad Usman
Maxwell Soita
Mohamed Ahmed Mohamed

Abstract

To minimize costs associated with software maintenance, hardware infrastructure, and secure communication, many organizations and data owners are increasingly opting for cloud storage solutions. However, ensuring the integrity and security of data stored on cloud servers (CS) remains a significant concern. Traditional methods typically use data encryption and decryption to safeguard data integrity, requiring DOs to download, decrypt, audit, and then re-encrypt data before re-uploading it to the CS. This approach is computationally intensive and introduces vulnerabilities, such as data leakage risks, particularly if encryption keys are compromised or data is transferred over insecure channels. While several methods have been proposed to enhance data integrity and availability on cloud platforms, few comprehensively address user data privacy and security, especially in group settings where user revocation is needed. Additionally, current solutions often fail to mitigate risks to sensitive data during the audit process itself. This paper proposes a novel framework designed to protect user identity and data privacy during public auditing of cloud-stored data. By building on and improving existing methods, this framework provides enhanced data confidentiality and integrity while reducing computational and communication overhead. It is also adaptable to various cloud storage models, including Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), thus offering a versatile and practical solution for secure cloud environments.

Article Details

How to Cite
[1]
Muhammad Usman, Maxwell Soita, and Mohamed Ahmed Mohamed, “An Improved Authenticator Based Public Auditing Scheme in Cloud Storage”, Journal of Engineering Technology and Applied Physics, vol. 8, no. 1, pp. 73–83, Mar. 2026.
Section
Regular Paper for Journal of Engineering Technology and Applied Physics

References

Cloud Security Alliance, “Treacherous 12: Cloud Computing Top Threats in 2016,” CSA Official Press Release, in press.

K. Wu, Y. Li, L. Chen and Z. Wang, “Research of Integrity and Authentication in OPC UA Communication Using Whirlpool Hash Function,” Appl. Sci., vol. 5, no. 3, pp. 446–458, 2015.

Y. Yu, M. H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai and G. Min, “Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage,” IEEE Trans. Informat. Forens. and Secur., vol. 12, no. 4, pp. 767-778, 2017.

L. Jin, K. Li, Z. Li, F. Xiao, G. J. Qi and J. Tang, “Deep Semantic-Preserving Ordinal Hashing for Cross-Modal Similarity Search,” IEEE Trans. Neur. Netw. and Learn. Syst., vol. 30, no. 5, pp. 1429-1440, 2019.

H. Li, L. Liu, C. Lan, C. Wang and H. Guo, “Lattice-based Privacy-preserving and Forward-secure Cloud Storage Public Auditing Scheme,” IEEE Access, vol. 8, pp. 86797-86809, 2020.

P. Singh and S. K. Saroj, “A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage,” in 2020 6th Int. Conf. Adv. Comput. and Commun. Syst., Coimbatore, India, pp. 695-700, 2020.

H. Shacham and B. Waters, “Compact Proofs of Retrievability, Compact Proofs of Retrievability,” J. Ccryptol., vol. 26, no. 3, pp. 442-483, 2013.

L. Rao, H. Zhang and T. Tu, “Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree,” IEEE Trans. Servic. Comput., vol. 13, no. 3, pp. 451-463, 2020.

J. Yu, K. Ren and C. Wang, “Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates,” IEEE Trans. Informat. Forens. and Secur., vol. 11, no. 6, pp. 1362-1375, 2016.

H. Wang, Q. Wu, B. Qin and J. Domingo-Ferrer, “Identity-based Remote Data Possession Checking in Public Clouds,” IET Informat. Secur., vol. 8, no. 2, pp. 114- 121, 2014.

C. Wang, S. S. M. Chow, Q. Wang, K. Ren and W. Lou, “Privacy-preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, vol. 62, no. 2, pp. 362-375, 2013.

H. Wang, D. He and S. Tang, “Identity-based Proxy-oriented Data Uploading and Remote Data Integrity Checking in Public Cloud,” IEEE Trans. Informat. Forens. and Secur., vol. 11, no. 6, pp. 1165-1176, 2016.

H. Wang, D. He, J. Yu and Z. Wang, “Incentive and Unconditionally Anonymous Identity-based Public Provable Data Possession,” IEEE Trans. Servic. Comput., vol. 12, no. 5, pp. 824-835, 2019.

B. Wang, B. Li and H. Li, “Knox: Privacy-preserving Auditing for Shared Data with Large Groups in the Cloud,” in Int. Conf. Appl. Cryptogr. and Netw. Secur., Berlin, Heidelberg, pp. 507-525, 2012.

G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu and R. Hao. “Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability,” J. Syst. and Softw., vol. 113, pp. 130-139, 2016.

W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu and R. Hao, “Light-weight and Privacy Preserving Secure Cloud Auditing Scheme for Group Users via the Third Party Medium,” J. Netw. and Comput. Appl., vol. 82, pp. 56-64, 2017.

P. Singh and S. K. Saroj, “A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage,” in 2020 6th Int. Conf. Adv. Comput. and Commun. Syst., Coimbatore, India, pp. 695-700, 2020.

T. T. Do, K. Le, T. Hoang, H. Le, T. V. Nguyen and N. M. Cheung, “Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning,” IEEE Trans. Image Process., vol. 28, no. 10, pp. 4954-4969, 2019.

A. Vamshi, G. J. Rao, S. K. Pasupuleti and R. Eswari, “EPF-CLPA: An Efficient Pairing-free Certificateless Public Auditing for Cloud-based CPS,” in 2021 5th Int. Conf. Intellig. Comput. and Contr. Syst., Madurai, India, pp. 48-54, 2021.

R. Zhou, M. He and Z. Chen, “Certificateless Public Auditing Scheme with Data Privacy Preserving for Cloud Storage,” in 2021 IEEE 6th Int. Conf. Cloud Comput. and Big Data Analyt., Chengdu, China, pp. 675-682, 2021.

H. Yan and W. Gui, “Efficient Identity-based Public Integrity Auditing of Shared Data in Cloud Storage with User Privacy Preserving,” IEEE Access, vol. 9, pp. 45822-45831, 2021.

Yogita and N. Kumar Gupta, “Integrity Auditing with Attribute Based ECMRSA Algorithm for Cloud Data Outsourcing,” in 2020 3rd Int. Conf. Intellig. Sustain. Syst., Thoothukudi, India, pp. 1284-1289, 2020.

X. Fan, F. Zhang, E. Turamat, C. Tong, J. H. Wu and K. Wang, “Provenance-based Classification Policy Based on Encrypted Search,” in 2020 2nd Int. Conf. Industr. Artif. Intellig., Shenyang, China, pp. 1-6, 2020.

R. V. Mante and N. R. Bajad, “A Study of Searchable and Auditable Attribute Based Encryption in Cloud,” in 2020 5th Int. Conf. Commun. and Electron. Syst., Coimbatore, India, pp. 1411-1415, 2020.

G. Ateniese, R. Di Pietro, L. V. Mancini and G. Tsudik, “Scalable and Efficient Provable Data Possession,” in Proc. 4th Int. Conf. Secur. and Privac. Commun. Netw., no. 9, pp. 1-10. 2008.

F. Wang, L. Xu, K. K. R. Choo, Y. Zhang, H. Wang and J. Li, “Lightweight Certificate-based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage,” IEEE Access, vol. 8, pp. 2258-2271, 2020.

X. Gao, J. Yu, Y. Chang, H. Wang and J. Fan, “Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword with Sensitive Information Privacy for Encrypted Cloud Data,” IEEE Trans. Depend. and Secur. Comput., vol. 19, no. 6, pp. 3774-3789, 2022.

B. Wang, B. Li and H. Li, “Oruta: Privacy-preserving Public Auditing for Shared Data in The Cloud,” IEEE Trans. Cloud Comput., vol. 2, no. 1, pp. 43-56, 2014.

H. Shacham and B. Waters, “Compact Proofs of Retrievability, Compact Proofs of Retrievability,” J. Cryptol., vol. 26, no. 3, pp. 442-483, 2013.

Z. Fu, X. Sun, Q. Liu, L. Zhou and J. Shu, “Achieving Efficient Cloud Search Services: Multi Keyword Ranked Search Over Encrypted Cloud Data Supporting Parallel Computing,” IEICE Trans. Commun., vol. 98, no. 1, pp. 190–200, 2015.

W. Shen, J. Qin, J. Yu, R. Hao and J. Hu, “Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage,” IEEE Trans. Informat. Forens. and Secur., vol. 14, no. 2, pp. 331-346, 2019.

Y. Luo, M. Xu, S. Fu, D. Wang and J. Deng, “Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation,” in 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, pp. 434-442, 2015.

R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg and I. Brandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as The 5th Utility,” Future Generat. Comput. Syst., vol. 25, no. 6, pp. 599–616, 2009.

K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities,” World Wide Web, vol. 15, no. 4, pp. 409–428, 2012.

Z. Xia, X. Wang, X. Sun and Q. Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data,” IEEE Trans. Parall. and Distrib. Syst., vol. 27, no. 2, pp. 340-352, 2016.

J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu and X. Sun, “Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks,” J. Commun. and Netw., vol. 17, no. 5, pp. 453-462, 2015.

M. K. Srinivasan, K. Sarukesi, P. Rodrigues, M. S. Manoj and P. Revathy, “State of-The Art Cloud Computing Security Taxonomies: A Classicizing of Security Challenges in the Present Cloud Computing Environment,” in Proc. Int. Conf. Adv. Comput., Commun. and Informat., pp. 470-476, 2012.

P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Nat. Inst. Stand. and Technol. Spec. Public., vol. 53, pp. 1-7, 2011.

F. Wang, L. Xu and W. Gao, “Comments on “SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors,” IEEE Trans. Computat. Soc. Syst., vol. 5, no. 3, pp. 854-857, 2018.

J. Sun and Y. Fang, “Cross-Domain Data Sharing in Distributed Electronic Health Record Systems,” IEEE Trans. Parall. and Distrib. Syst., vol. 21, no. 6, pp. 754-764, 2010.