Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud

Authors

  • Saloni Atre P.G. Student, Department of Computer Science and Engineering, SIRT, Bhopal, India
  • Mayank Namdev Professor, Department of Computer Science and Engineering, SIRT, Bhopal, India

DOI:

https://doi.org/10.24113/ijoscience.v4i8.150

Abstract

Cloud computing is an enormous area which shares huge amount of data over cloud services and it has been increasing with its on-demand technology. Since, with these versatile cloud services, when the delicate data stored within the cloud storage servers, there are some difficulties which has to be managed like its Security Issues, Data Privacy, Data Confidentiality, Data Sharing and its integrity over the cloud servers dynamically. Also, the authenticity and data access control should be maintained in this wide environment. Thus, Attribute based Encryption (ABE) is a significant version of cryptographic technique in the cloud computing environment. Data integrity, one of the most burning challenges in secure cloud storage. Data auditing protocols enable a verifier to efficiently check the integrity of the files without downloading the entire file from the cloud. In this paper cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users can upload files to cloud through some set of attributes and specify auditor to check the integrity of data files. Existing protocols are mostly based on public key infrastructure or an exact identity, which lacks ?exibility of key management. In this research work Cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users can upload files to cloud through some set of attributes and specify auditor to check the integrity of data files. Variable attributes are used to generate the private key and their performance is evaluated under variable attribute list.

Downloads

Download data is not yet available.

References

M. Xie, H. Wang, J. Yin, X. Meng, Integrity auditing of outsourced data,in: Proceeding of VLDB’07, University of Vienna, Austria, Sep.23-27, 2007,pp. 782-793.

Mell, Peter, and Tim Grance. The NIST definition of cloud computing, 2011.

Kumari, M. P., & Paul, P. R. K. (2016). A Study for Authentication and Integrity of Data Files in Cloud Computing. SMART MOVES JOURNAL IJOSCIENCE, 2(9). doi.org/10.24113/ojsscience.v2i9.109

Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy Preserving Public Auditing for Secure Cloud Storage. Computers, IEEE Transactions, 2013, pp. 362–375.

Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou. Toward secure and dependable storage services in cloud computing. Services Computing, IEEE Transactions, 2012, pp. 220–232.

IK Meenakshi and Sudha George. Cloud Server Storage Security using TPA. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 2014.

Tejaswini, K. Sunitha, and S. K. Prashanth. Privacy Preserving and Public Auditing Service for Data Storage in Cloud Computing. Indian Journal of Research, 2013.

Jadhav Santosh and B.R Nandwalkar. Privacy Preserving and Batch auditing in Secure Cloud Data Storage using AES. Proceedings of 13th IRF International Conference, 2014.

S Ezhil Arasu, B Gowri, and S Ananthi. Privacy-Preserving Public Auditing in cloud using HMAC Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 2013.

R.Swathi and T.Subha, “Enhancing Data Storage Security in Cloud using Certificateless Public Auditing”, IEEE, pp. 348-352, 2017.

Yong Yu, Yannan Li, Bo Yang, Willy Susilo, Guoming Yang and Jian Bai, “for Reliable Cloud Storage Systems”. IEEE Transactions on Dependable and SAttribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage”, IEEE Transaction on Emerging Topics in Computing, Vol. 14, No. 8, 2017.

Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, K-K. R. Choo. “Fuzzy Identity-Based Data Integrity Auditing ecure Computing, 2017.

Ming-quan Hong,Wen-bo Zhao, Peng-yu Wang, “Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing”, IEEE, 2016.

Yong Yu • Man Ho Au • Yi Mu • Shaohua Tang • Jian Ren • Willy Susilo • Liju Dong, “Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage”, Springer, 2014.

G. Yamamoto, S. Oda, K. Aoki. “Fast integrity for large data”. Proc. ECRYPT workshop Software Performance Enhancement for Encryption and Decryption. Amsterdam, Netherlands 2007, 21-32

Downloads

Published

08/05/2018

How to Cite

Atre, S., & Namdev, M. (2018). Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud. SMART MOVES JOURNAL IJOSCIENCE, 4(8), 1–5. https://doi.org/10.24113/ijoscience.v4i8.150