Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud
Cloud computing is an enormous area which shares huge amount of data over cloud services and it has been increasing with its on-demand technology. Since, with these versatile cloud services, when the delicate data stored within the cloud storage servers, there are some difficulties which has to be managed like its Security Issues, Data Privacy, Data Confidentiality, Data Sharing and its integrity over the cloud servers dynamically. Also, the authenticity and data access control should be maintained in this wide environment. Thus, Attribute based Encryption (ABE) is a significant version of cryptographic technique in the cloud computing environment. Data integrity, one of the most burning challenges in secure cloud storage. Data auditing protocols enable a verifier to efficiently check the integrity of the files without downloading the entire file from the cloud. In this paper cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users can upload files to cloud through some set of attributes and specify auditor to check the integrity of data files. Existing protocols are mostly based on public key infrastructure or an exact identity, which lacks ?exibility of key management. In this research work Cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users can upload files to cloud through some set of attributes and specify auditor to check the integrity of data files. Variable attributes are used to generate the private key and their performance is evaluated under variable attribute list.
M. Xie, H. Wang, J. Yin, X. Meng, Integrity auditing of outsourced data,in: Proceeding of VLDB’07, University of Vienna, Austria, Sep.23-27, 2007,pp. 782-793.
Mell, Peter, and Tim Grance. The NIST definition of cloud computing, 2011.
Kumari, M. P., & Paul, P. R. K. (2016). A Study for Authentication and Integrity of Data Files in Cloud Computing. SMART MOVES JOURNAL IJOSCIENCE, 2(9). doi.org/10.24113/ojsscience.v2i9.109
Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy Preserving Public Auditing for Secure Cloud Storage. Computers, IEEE Transactions, 2013, pp. 362–375.
Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou. Toward secure and dependable storage services in cloud computing. Services Computing, IEEE Transactions, 2012, pp. 220–232.
IK Meenakshi and Sudha George. Cloud Server Storage Security using TPA. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 2014.
Tejaswini, K. Sunitha, and S. K. Prashanth. Privacy Preserving and Public Auditing Service for Data Storage in Cloud Computing. Indian Journal of Research, 2013.
Jadhav Santosh and B.R Nandwalkar. Privacy Preserving and Batch auditing in Secure Cloud Data Storage using AES. Proceedings of 13th IRF International Conference, 2014.
S Ezhil Arasu, B Gowri, and S Ananthi. Privacy-Preserving Public Auditing in cloud using HMAC Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 2013.
R.Swathi and T.Subha, “Enhancing Data Storage Security in Cloud using Certificateless Public Auditing”, IEEE, pp. 348-352, 2017.
Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guoming Yang and Jian Bai, “for Reliable Cloud Storage Systems”. IEEE Transactions on Dependable and SAttribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage”, IEEE Transaction on Emerging Topics in Computing, Vol. 14, No. 8, 2017.
Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, K-K. R. Choo. “Fuzzy Identity-Based Data Integrity Auditing ecure Computing, 2017.
Ming-quan Hong,Wen-bo Zhao, Peng-yu Wang, “Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing”, IEEE, 2016.
Yong Yu • Man Ho Au • Yi Mu • Shaohua Tang • Jian Ren • Willy Susilo • Liju Dong, “Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage”, Springer, 2014.
G. Yamamoto, S. Oda, K. Aoki. “Fast integrity for large data”. Proc. ECRYPT workshop Software Performance Enhancement for Encryption and Decryption. Amsterdam, Netherlands 2007, 21-32
How to Cite
Copyright (c) 2018 Saloni Atre, Mayank Namdev
This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.