Enhanced Public Auditability & Secure Data Storage in Cloud Computing

被引:0
|
作者
Chakraborty, Tamal Kanti [1 ]
Dhami, Anil [1 ]
Bansal, Prakhar [1 ]
Singh, Tripti [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Dept Comp Sci & Engn, Allahabad, Uttar Pradesh, India
来源
PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2013年
关键词
Cloud computing; Data security; Elliptic curve cryptography (ECC);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the most envisioned paradigm shift in the computing world. Its services are being applied in several IT scenarios. This unique platform has brought new security issues to contemplate. This paper proposes a homomorphic encryption scheme based on the Elliptic curve cryptography. It implements a provable data possession scheme to support dynamic operation on data. The application of proof of retrievability scheme provisioned the client to challenge integrity of the data stored. The notion of a third party auditor (TPA) is considered, who verifies and modifies the data on behalf of the client. Data storage at the server is done using a Merkle hash tree (MHT) accomplishing faster data access. This proffered scheme not only checks the data storage correctness but also identifies misbehaving servers. The initial results demonstrate its effectiveness as an improved security system for data storage compared to the existing ones in most prospects.
引用
收藏
页码:101 / 105
页数:5
相关论文
共 50 条
  • [31] Secure and Privacy Enhanced Authentication Framework for Cloud Computing
    Patel, Subhash Chandra
    Singh, Ravi Shankar
    Jaiswal, Sumit
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1631 - 1634
  • [32] Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing
    Rejin, Paul R.
    Paul, Raj D.
    COGENT ENGINEERING, 2019, 6 (01):
  • [33] A hybrid cryptography technique for data storage on cloud computing
    Bermani, Ali Kadhim
    Murshedi, Tariq A. K.
    Abod, Zaid A.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1613 - 1624
  • [34] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
  • [35] An Overview of Data Storage in Cloud Computing
    Odun-Ayo, Isaac
    Ajayi, Olasupo
    Akanle, Boladele
    Ahuja, Ravin
    2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS), 2017, : 29 - 34
  • [36] Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing
    Xu, Yan
    Ding, Ran
    Cui, Jie
    Zhong, Hong
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 399 - 416
  • [37] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [38] Privacy Preservation of a Group and Secure Data Storage in Cloud Environment
    Govinda, K.
    Sathiyamoorthy, E.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2015, 15 (01) : 46 - 54
  • [39] Data control in public cloud computing: Issues and challenges
    Sharma A.
    Jha P.
    Singh S.
    Sharma, Ashok (drashoksharma@hotmail.co.in), 1600, Bentham Science Publishers (14): : 564 - 579
  • [40] Secure Public-Auditing Cloud Storage Enabling Data Dynamics in the Standard Model
    Ma, Mingxiao
    Weber, Jos
    van den Berg, Jan
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 170 - 175