Skip to main content
Log in

Privacy-preserving public auditing for educational multimedia data in cloud computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, as distance learning is being widly used, multimedia data becomes an effective way for delivering educational contents in online educational systems. To handle the educational multimedia data efficiently, many distance learning systems adopt a cloud storage service. Cloud computing and storage services provide a secure and reliable access to the outsourced educational multimedia contents for users. However, it brings challenging security issues in terms of data confidentiality and integrity. The straightforward way for the integrity check is to make the user download the entire data for verifying them. But, it is inefficient due to the large size of educational multimedia data in the cloud. Recently many integrity auditing protocols have been proposed, but most of them do not consider the data privacy for the cloud service provider. Additionally, the previous schemes suffer from dynamic management of outsourced data. In this paper, we propose a public auditing protocol for educational multimedia data outsourced in the cloud storage. By using random values and a homomorphic hash function, our proposed protocol ensures data privacy for the cloud and the third party auditor (TPA). Also, it is secure against lose attack and temper attack. Moreover, our protocol is able to support fully dynamic auditing. Security and performance analysis results show that the proposed scheme is secure while guaranteeing minimum extra computation costs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of ACM CCS, pp 598–610

  2. Ateniese G, Pietro RD, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of SecureComm, pp 1-10

  3. Bao F, Deng R, Zhu H (2003) Variations of Diffie-Hellman problem. Inf Commun SecurityICICS:301–312

  4. Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing, ASIACRYPT 2001. LNCS 2248:514–532

    MathSciNet  MATH  Google Scholar 

  5. Erway C, Kupcu A, Papamanthou C, Tamassia R (2009) Dynamic provable data possession. In: Proceedings of CCS, pp 213-222

  6. Gennaro R, Katz J, Krawczyk H, Rabin T (2010) Secure network coding over the integers. Public key cryptography pkc, Springer LNCS, 6056, pp 142–160

  7. Govinda Y, Vijaya G (2013) Complete privacy preserving auditing for data integrity in cloud computing. IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp 1559–1566

  8. Juels A, Kaliski BS (2007) PORs: proofs pf retrievability for large files. In: Proceedings of ACM CCS, pp 584–597

  9. Krohn M, Freeman M, Mazieres D (2004) On-the-fly verification of rateless erase codes for efficient content distribution. In: Proc. IEEE symposium on security and privacy

  10. Li J Study on the development of mobile learning promoted by cloud computing (2010) information engineering and computer science (ICIECS). Second international conference, pp 1-4

  11. Liu H, Zhang P, Liu J (2013) Public data integrity verification for secure cloud storage. J Netw:373–380

  12. Masud M, Huang X (2012) A novel approach for adopting cloud-based e-learning system. In: IEEE/ACIS 11th international conference on computer and information science (ICIS), pp 37–42

  13. Shacham H, Waters B (2008) Compact proofs of retrievability. In: Proc. ASIACRYPT. Springer-Verlag, pp 90–107

  14. Wang C, Wang Q, Ren K, Lou W (2010) Privacy preserving public auditing for data storage security in cloud computing. IEEE InfoCom:1–9

  15. Wang Q, Wang C, Ren K, Lou W (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst:847–859

  16. Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726

    Article  Google Scholar 

  17. Yu H, Pedrinaci C, Dietze S, Domingue J (2012) Using linked data to annotate search educational video resources for supporting distance learning. IEEE Trans Learn Technologies:130–142

  18. Zeng K (2008) Publicly verifiable remote data integrity. In: Proceedings of the international conference on information and communications security, ICICS, pp 419–434

  19. Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2010) Efficient provable data possession for hybrid clouds. In: Proceedings of the 17th ACM conference on computer and communications security, pp 756–758

  20. Zhu Y, Wang H, Hu Z, Ahn GJ, Hu H, Yau SS (2011) Dynamic audit services for integrity verification of outsourced storage in clouds. In: the proceedings of ACM SAC, pp 1550–1557

Download references

Acknowledgments

This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2013R1A2A2A01005559). This research was supported by the Chung-Ang University Research Scholarship Grants in 2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junbeom Hur.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, D., Kwon, H., Hahn, C. et al. Privacy-preserving public auditing for educational multimedia data in cloud computing. Multimed Tools Appl 75, 13077–13091 (2016). https://doi.org/10.1007/s11042-015-2594-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2594-5

Keywords

Navigation