Enhanced Public Auditability & Secure Data Storage in Cloud Computing

被引:0
|
作者
Chakraborty, Tamal Kanti [1 ]
Dhami, Anil [1 ]
Bansal, Prakhar [1 ]
Singh, Tripti [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Dept Comp Sci & Engn, Allahabad, Uttar Pradesh, India
来源
PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2013年
关键词
Cloud computing; Data security; Elliptic curve cryptography (ECC);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the most envisioned paradigm shift in the computing world. Its services are being applied in several IT scenarios. This unique platform has brought new security issues to contemplate. This paper proposes a homomorphic encryption scheme based on the Elliptic curve cryptography. It implements a provable data possession scheme to support dynamic operation on data. The application of proof of retrievability scheme provisioned the client to challenge integrity of the data stored. The notion of a third party auditor (TPA) is considered, who verifies and modifies the data on behalf of the client. Data storage at the server is done using a Merkle hash tree (MHT) accomplishing faster data access. This proffered scheme not only checks the data storage correctness but also identifies misbehaving servers. The initial results demonstrate its effectiveness as an improved security system for data storage compared to the existing ones in most prospects.
引用
收藏
页码:101 / 105
页数:5
相关论文
共 50 条
  • [21] Secure Data Management Service on Cloud Computing Infrastructures
    Agrawal, Divyakant
    El Abbadi, Amr
    Emekci, Fatih
    Metwally, Ahmed
    Wang, Shiyuan
    NEW FRONTIERS IN INFORMATION AND SOFTWARE AS SERVICES: SERVICE AND APPLICATION DESIGN CHALLENGES IN THE CLOUD, 2011, 74 : 57 - +
  • [22] Intelligent cryptography approach for secure distributed big data storage in cloud computing
    Li, Yibin
    Gai, Keke
    Qiu, Longfei
    Qiu, Meikang
    Zhao, Hui
    INFORMATION SCIENCES, 2017, 387 : 103 - 115
  • [23] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [24] Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing
    Singh, Anirudha Pratap
    Pasupuleti, Syam Kumar
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 751 - 759
  • [25] Enhanced Privacy Preservation and Data Storage Security in Public Cloud
    Deshmukh, Rachana
    Deshmukh, Rashmi
    Chaudhari, Pallavi
    HELIX, 2018, 8 (05): : 3726 - 3730
  • [26] Application of Cloud Computing Technology on Computer Secure Storage
    Zhou, You
    Tang, Yu
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2018), 2018, 78 : 110 - 113
  • [27] Toward Secure and Dependable Storage Services in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Cao, Ning
    Lou, Wenjing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2012, 5 (02) : 220 - 232
  • [28] An Efficient and Secure Data Storage in Mobile Cloud Computing through RSA and Hash Function
    Garg, Preeti
    Sharma, Vineet
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 334 - 339
  • [29] SECO: Secure and scalable data collaboration services in cloud computing
    Dong, Xin
    Yu, Jiadi
    Zhu, Yanmin
    Chen, Yingying
    Luo, Yuan
    Li, Minglu
    COMPUTERS & SECURITY, 2015, 50 : 91 - 105
  • [30] An E-learning System Based on Secure Data Storage Services in Cloud Computing
    Gopinath, R.
    Geetha, B. G.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2013, 8 (02) : 1 - 17