JOURNAL ARTICLE

Privacy preserving data auditing protocol for secure storage in mobile cloud computing

Abstract

In spite of the growing usage of smart mobile devices, the inherent restrictions like resource scarcity, mobility and frequent disconnections makes it difficult to exploit its full potential. Cloud computing simplifies the deployment of large-scale distributed systems and enables advanced computational power with improved storage capabilities. The evolution of Mobile Cloud Computing (MCC) exploits the services of Cloud Service Providers (CSP) by outsourcing the local data storage and computation to the remote servers and thereby relieving the overhead incurred by mobile clients for data storage and processing. In spite of the relief, the clients no longer have control over their outsourced data which demands the purpose of ensuring the data intactness maintained by the Cloud Storage Server (CSS). The resource constrained mobile devices act as a thin client for the cloud server access and hence the computation for ensuring the proof of correctness for secure data storage becomes an overhead with existing solutions. The proposed auditing protocol introduces a trusted third party auditor (TPA) who will be in charge of verifying the correctness of data stored at cloud storage on behalf of the user without the need for retrieving the entire data. The usage of Bilinear pairing and Merkle Hash Trees guarantees Blockless verification by TPA. The verification process in the proposed method reduces the auditing overhead at the mobile device using short signatures. The proposed auditing protocol saves the mobile client's computational resource, thereby achieving cost-effectiveness to gain trust in the Cloud Storage Service.

Keywords:
Computer science Cloud computing Cloud storage Mobile cloud computing Converged storage Computer network Merkle tree Overhead (engineering) Correctness Distributed computing Computer security Computer data storage Information repository Hash function Operating system Cryptographic hash function Algorithm

Metrics

4
Cited By
2.24
FWCI (Field Weighted Citation Impact)
18
Refs
0.90
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

PRIVACY PRESERVING PROTOCOL IN PUBLIC AUDITING FOR SECURE CLOUD STORAGE

SHAHUL HAMEED ADr. A.SHAJI GEORGEBASHIRU AREMU

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2020
JOURNAL ARTICLE

PRIVACY PRESERVING PROTOCOL IN PUBLIC AUDITING FOR SECURE CLOUD STORAGE

SHAHUL HAMEED AA. Shaji GeorgeBashiru Aremu

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2020
JOURNAL ARTICLE

Privacy-preserving public auditing for secure data storage in fog-to-cloud computing

Hui TianFulin NanChin‐Chen ChangYongfeng HuangJing LuYongqian Du

Journal:   Journal of Network and Computer Applications Year: 2018 Vol: 127 Pages: 59-69
JOURNAL ARTICLE

Privacy Preserving Public Auditing for Secure Cloud Storage

Revti R. Adel

Journal:   International Journal for Research in Applied Science and Engineering Technology Year: 2021 Vol: 9 (5)Pages: 1898-1904
© 2026 ScienceGate Book Chapters — All rights reserved.