10 1016@j Jksuci 2020 06 001
10 1016@j Jksuci 2020 06 001
10 1016@j Jksuci 2020 06 001
Adnan Alrabea
PII: S1319-1578(20)30389-X
DOI: https://doi.org/10.1016/j.jksuci.2020.06.001
Reference: JKSUCI 797
Please cite this article as: Alrabea, A., A Modified Boneh-Lynn-Shacham Signing Dynamic Auditing In Cloud
Computing, Journal of King Saud University - Computer and Information Sciences (2020), doi: https://doi.org/
10.1016/j.jksuci.2020.06.001
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover
page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version
will undergo additional copyediting, typesetting and review before it is published in its final form, but we are
providing this version to give early visibility of the article. Please note that, during the production process, errors
may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
© 2020 Production and hosting by Elsevier B.V. on behalf of King Saud University.
A MODIFIED BONEH-LYNN-SHACHAM SIGNING DYNAMIC
AUDITING IN CLOUD COMPUTING
Adnan Alrabea
ABSTRACT
Cloud Computing is an alternative to conventional IT Outsourcing. As a result, cloud computing migration
between organizations is rapidly growing. The adoption of this technology brings many positive aspects,
but prescribes various risks and concerns. An organization that officially provides its cloud computing
services to external providers and implies that its IT functions and process are outsourced to third-party
providers of BPO services.For the purposes of privacy-making public audit processes in dynamic cloud
data storage, a modified Boneh-Lynn-Shachame Dynamic Auditing (MBLSSDA) algorithm is suggested.
The proposed algorithm executes an audit process for many users on the basis of a batch audit
simultaneously and effectively in order to enable Third Party Auditing. This paper integrates the
homomorphic authenticator in an algorithm of dynamic signing audit by random marking in terms of the
privacy conserving public auditing process.
ABSTRACT
Cloud Computing is an alternative to conventional IT Outsourcing. As a result, cloud computing migration
between organizations is rapidly growing. The adoption of this technology brings many positive aspects,
but prescribes various risks and concerns. An organization that officially provides its cloud computing
services to external providers and implies that its IT functions and process are outsourced to third-party
providers of BPO services.For the purposes of privacy-making public audit processes in dynamic cloud
data storage, a modified Boneh-Lynn-Shachame Dynamic Auditing (MBLSSDA) algorithm is suggested.
The proposed algorithm executes an audit process for many users on the basis of a batch audit
simultaneously and effectively in order to enable Third Party Auditing. This paper integrates the
homomorphic authenticator in an algorithm of dynamic signing audit by random marking in terms of the
privacy conserving public auditing process.
1. INTRODUCTION
Cloud storage system can give a flexible on-demand data storage service to the cloud user at anytime and
anywhere [1]. However, the Cloud Service Provider (CSP) owned the user data physically as well as
virtually. In this cloud environment, the cloud data are not controlled by the cloud user. Instead cloud
auditors manage the cloud data. But this process doesn’t ensure the data integrity which means
unauthorized cloud user can alter the data without owner’s knowledge. The individual belong to a group
can alter the data of other members in the same group.
Thus to avoid these kinds of issues this work proposed a Modified Boneh-Lynn-Shacham Signing Dynamic
Auditing (MBLSSDA) algorithm for privacy-preserving public auditing process in dynamic storage in
cloud. To enable the Third Party Auditing (TPA) simultaneously and efficiently,auditing process for single
users as well as batch auditing for multiple users is efficiently done in this proposed work. Additionally,
this work implements the Rijndael algorithm forgenerating an encryption key by data owner at the time
of group user requesting the data owner to access the data. This process is done based on the algorithm
SHA-512 for creating the hash key which is used by TPA for checking the integrity of cloud data and one
of the added advantages of this proposed work is one-time password verification scheme.
2. PRIVACY-PRESERVING PUBLIC AUDITING SCHEME
This work integrates an authenticator with random marking approach in terms of privacy-preserving public
auditing process using Modified Boneh-Lynn-Shacham Signing Dynamic Auditing (MBLSSDA)
algorithm. A linear combination of sampled blocks in cloud service answer is masked with randomly
generated Pseudo-Random Function (PRF). In the random making, the Third Parity Auditor (TPA) no
longer as need the user data to build a correct group and therefore cannot originate the data content of the
user [13][14] .A public auditing scheme basically contains four different algorithms such as VerifyProof,
GenProof, SigGen, KeyGen which runs according to the user implantation setup.
The data owner uses SigGen to produce authentication metadata, which may contain MAC signatures or
related auditing material (T.Vijayalakshmi et al., 2014), (Mehmet SabırKiraz et. al., 2015), (Jachak K.B et
al., 2012). GenProof is run by the cloud service to assert data storage accuracy, while the TPA applies
VerifyProof to verify cloud service code proof.This proposed work adapts a batch auditing scheme
usingRijndael algorithm.
User
Key validation for
registration and User Profile
email id verification
email id Interface
(First Time)
verification
File Search
File Upload and
User Login
Download
Split Sub
blocks OTP generation and
Encrypt the send mail
spited files
Stored in to Multi
Cloud Server OTP
Validation
Decryption and
Merging
Download
Data Base
Secure Data
Sharing
User 1
User 2 Cloud
Account Detail
server
User n
File
uploading Request
Private and DB
public data
Revocation Admin
SigGen Algorithm
Verify Algorithm
//Verify the signature with public key
Data: public key v ∈ G2,signature σ ∈ G1,message M ∈ {0,1}*
Result: boolean value
h ←H(M) ∈ G1
Return Test ((g^2,v,h,σ)
During this auditing processas shown in Figure 5, each and every group user are authenticated by using
one-time password approach and this password generated by using a SHA-512 algorithm.
The Secure Hash Algorithm (SHA) was developed by according to Federal Information Processing
Standard (FIPS 180) and National Institute of Standards and Technology (NIST) in 1993 [11][12]. SHA is
worked based on the hash function MD4. SHA-1 is also stated in RFC 3174.
After generating the OTP it should be sent to the cloud user by using a gateway operation to the user mail
or mobile. Here, the URL is used for this process as a library and command line tool for transferring data
across it.
1.curl_init(): It is utilized to initialize a session.
2.curl_setopt(): Set a possibility for the URL transfer.
3.curl_exec():Perform a cURL session.
4.curl_close():Close a cURL session and set free all the cloud resources.
SignGen
Verification
KeyGen
Metadata
TPA
CSP
TPA
GenProof
CSP File F
User Personal
TPA information
User Admin
Figure.5 Proposed Modified Boneh-Lynn-Shacham Based Cloud Auditing
Following procedure shows the overall process of proposed Modified Boneh-Lynn-Shacham Based
cloud auditing with Rijndael algorithm based data integrity checking process[17].
Step 2: Cloud user register and after enter the OTP to login. If the user want to access a file, initially
user send the request to server for authorization of file.
Step 3: Cloud server block the user or accepts request or itdepends on user validation. After accept
the request, server sends the encryption key to the users mobile or mail. Rijandael algorithm is used
for generating the Encryption key which is used for security purpose.
Step 4: Entering the encryption key user can modify or update the file and upload the file to the cloud
server again. A new hash value is generated after the file is uploaded.
Step 5: Now, the Third Party Administrator login and batch auditby comparing changed file hash
value and original file, if the hash valuesobtained is same, then file is not altered otherwise it is
altered by User.
Step 6: After this process cloud admin do login and will send the list of files that have been altered
over the SMS or mail to the cloud user.
Step 7: The cloud user will review the tempered files and will discard the change made by user or
overwrite the original file.
Figure.6 Key
Generation Time of
MBLSSDA-
RIJNDAEL
Algorithm
Figure 7shows that the signature generation time is comparative to the block size. since the master
user required to create secret keys for each and every group user during the catch auditing process
individually.
120
Authentication Signature
Generation Time (sec)
100
80
60 Authentication
Signature
40
Generation Time
20
0
1 2 3 4 5 6 7 8 9 10
Number of Block
Figure.7 Authentication Signature Generation Time ofMBLSSDA-RIJNDAEL Algorithm
Figure 8 shows the comparison results of proposed Modified Boneh-Lynn-Shacham Signing Dynamic
Auditing (MBLSSDA) with Rijndael algorithm and ELGAMAL digital signature scheme with Merkle B-
tree (Nayana.S.R et al., 2013) in terms of user verification time.
User Verification Time (Sec)
100
80
60
MBLSSDA-
40 RIJNDAEL
ELGAMAL-Merkle B-
20 tree
0
1 2 3 4 5 6 7 8 9 10
File Size (Block Number)
From the results it indicates that, although ELGAMAL-Merkle B-tree scheme has very high User
verification time when compared with the proposed work. This is because ELGAMAL-Merkle B-tree
scheme needs a number of multiplication operations and exponentiation operations on Group
number during the batch auditing process for challenging blocks.
7. CONCLUSION
This paper presents MBLSSDA algorithm for privacy-preserving public auditing process in term of
dynamic cloud data storage. It enables the TPA to perform efficient auditing process for multiple
users as well as doing in the batch auditing for multiple users. Additionally, this work implements
the Rijndael algorithm to generate encryption key by data owner and at the time of other group user
requesting the data owner to access the data.
This process is done based on the SHA-512 algorithm for creating the hash key which is used for TPA
to check the integrity of cloud data and one of the added advantages of this proposed work is one-
time password verification scheme. At last, the TPA verifies the data integrity. The result proves that
by comparing single auditing with batch auditing process, the later one performs better and it
enhances the whole system performance
REFERENCE
[1] Qiu, M., Dai, W., &Vasilakos, A. V. (2016). Loop Parallelism Maximization for Multimedia Data
Processing in Mobile Vehicular Clouds. IEEE Transactions on Cloud Computing, 7(1), 250-258.
[2] Patidar, P., & Bhardwaj, A. (2011). Network security through SSL in cloud computing
environment. International Journal of Computer Science and Information Technologies, 2 (6) ,
2011, 2800-2803
[3] Jose, G. J. A., Sajeev, C., &Suyambulingom, D. C. (2011). Implementation of data security in
cloud computing. International Journal of P2P Network Trends and Technology, 1(1), 18-22.
[4] GarimaKumari, Lakshmi madhuri. Key Aggregate Cryptosystem & Intrusion Detection For Data
sharing In Cloud. Multidisciplinary Journal of Research in Engineering and Technology, 1(3),
308-317
[5] Mahalle, R. V., &Pawade, P. P. (2014). A review of secure data sharing in cloud using key
aggregate cryptosystem and decoy technology. Int J Sci Res, 3(12), 2694-2697.
[6] Hemlatha, S. M., & Ganesh, S. (2013). A brief survey on encryption schemes on cloud
environments. Int. J. Comput. Org. Trends, 3(9).
[7] Khan, K. M., &Malluhi, Q. (2013). Trust in cloud services: providing more controls to
clients. Computer, (7), 94-96.
[8] Cimato, S., Damiani, E., Zavatarelli, F., &Menicocci, R. (2013, June). Towards the certification of
cloud services. In 2013 IEEE Ninth World Congress on Services (pp. 92-97). IEEE.
[9] Nagarajan, M., &Karthikeyan, S. (2012, March). A new approach to increase the life time and
efficiency of wireless sensor network. In International Conference on Pattern Recognition,
Informatics and Medical Engineering (PRIME-2012) (pp. 231-235). IEEE.
[10] Vasarhelyi, M. A., &Halper, F. B. (1991). The continuous audit of online systems. In Auditing: A
Journal of Practice and Theory.10(1),110-125.
[11] Massonet, P., Naqvi, S., Ponsard, C., Latanicki, J., Rochwerger, B., &Villari, M. (2011, May). A
monitoring and audit logging architecture for data location compliance in federated cloud
infrastructures. In 2011 IEEE International Symposium on Parallel and Distributed Processing
Workshops and Phd Forum (pp. 1510-1517). IEEE.
[12] Ezhilarasi, M., &Krishnaveni, V. (2018). A survey on wireless sensor network: energy and
lifetime perspective. Taga Journal of Graphic Technology, 14.
[13] Zhang, C., Cai, Z., Chen, W., Luo, X., & Yin, J. (2012). Flow level detection and filtering of low-
rate DDoS. Computer Networks, 56(15), 3417-3431.
[14] Wu, Y., Zhao, Z., Bao, F., & Deng, R. H. (2015). Software puzzle: A countermeasure to resource-
inflated denial-of-service attacks. IEEE Transactions on Information Forensics and security, 10(1),
168-177.
[16] McNevin, T. J., Park, J. M., &Marchany, R. (2004). pTCP: A client puzzle protocol for defending
against resource exhaustion denial of service attacks. Virginia Tech Univ., Dept. Elect. Comput.
Eng., Blacksburg, VA, USA, Tech. Rep. TR-ECE-04-10.
[17] Tsai, H. Y., Huang, Y. L., & Wagner, D. (2009). A graph approach to quantitative analysis of
control-flow obfuscating transformations. IEEE Transactions on Information Forensics and
Security, 4(2), 257-267.