An enhanced secure, robust and efficient crypto scheme for ensuring data privacy in public cloud using obfuscation & encryption

被引:0
|
作者
Yakobu D. [1 ]
Kalluri H.K. [1 ]
Dondeti V. [1 ]
机构
[1] Department of CSE, Vignan’s Foundation for ScienceTechnology and Research, Vadlamudi, 522213, AP
来源
Ingenierie des Systemes d'Information | 2019年 / 24卷 / 06期
关键词
Cloud computing; Cryptography; Obfuscation; Privacy;
D O I
10.18280/isi.240607
中图分类号
学科分类号
摘要
Cloud has been emerging, popular and very demanding technology now a day. Cloud has got wide popularity with its sophisticated features. The primary features of cloud include internet access, more storage, easy setup, automatic updates, and low cost and resource provisioning based on “pay as you go” policy. In spite of advantages, security is considered to be more important and drew the attention of many researchers because it is not guaranteed in an open cloud. The data storage is becoming an indispensable measurement in cloud and most of the times cloud does not guarantee that data that has been stored is secured from illegitimate access. Many researchers are working to ensure data security in the cloud but unfortunately they do not provide adequate security to data. This paper is aiming to propose a secure hybrid scheme with obfuscation and cryptography to ensure the privacy of data shared in public cloud. Experimental results show that the proposed scheme yields good results. © 2019 International Information and Engineering Technology Association. All rights reserved.
引用
收藏
页码:603 / 609
页数:6
相关论文
共 50 条
  • [31] Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage
    Yu, Yong
    Au, Man Ho
    Mu, Yi
    Tang, Shaohua
    Ren, Jian
    Susilo, Willy
    Dong, Liju
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (04) : 307 - 318
  • [32] Enhanced Symmetric Encryption Technique for Securing Users' Data in Public Cloud Environment
    Fairosebanu, A.
    Jebaseeli, A. Nisha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 785 - 791
  • [33] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [34] A secure and efficient remote data auditing scheme for cloud storage
    El Ghoubach, Imad
    Ben Abbou, Rachid
    Mrabti, Fatiha
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (05) : 593 - 599
  • [35] Secure, Efficient and Dynamic Data Search using Searchable Symmetric Encryption
    Shaikh, Mohammed Saad
    Bavishi, Jatna
    Patel, Reema
    PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 246 - 252
  • [36] An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 110 - 117
  • [37] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [38] A study for method of construct encryption scheme of data management to Secure Data using bucket ID in Cloud Computing Environment
    Song, You-Jin
    Cha, Jaesang
    Kang, Jang-Mook
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (03): : 1053 - 1064
  • [39] Enhanced Public Auditability & Secure Data Storage in Cloud Computing
    Chakraborty, Tamal Kanti
    Dhami, Anil
    Bansal, Prakhar
    Singh, Tripti
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 101 - 105
  • [40] Secure and efficient general matrix multiplication on cloud using homomorphic encryption
    Gao, Yang
    Quan, Gang
    Homsi, Soamar
    Wen, Wujie
    Wang, Liqiang
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (18) : 26394 - 26434