Cloud auditing and authentication scheme for establishing privacy preservation

被引:0
作者
Rajesh Bingu
S. Jothilakshmi
机构
[1] Koneru Lakshmaiah Education Foundation,Department of CSE
[2] Annamalai University,Department of Information Technology
来源
Multimedia Tools and Applications | 2024年 / 83卷
关键词
Cloud storage; Auditing; Authentication; Duplication; Data integrity;
D O I
暂无
中图分类号
学科分类号
摘要
Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data duplication. But the unique copy of the original data is stored in the cloud server, and it causes data loss in terms of corruption or missing. It is essential to maintain the duplicate copy of the file and integrity auditing in the field of academic and industrial. The file over the cloud is maintained in a secure or protected manner. This paper proposes cloud auditing with secure file maintenance to retain the duplicate copy of the encrypted file. During the process of public auditing, integrity is maintained for each copy with reduced storage. Secure Authentication with User Anonymity (SAUS) is established with cloud auditing and confidentiality during the process of duplication, and auditing integrity is maintained with encryption approaches. The duplication process is invoked with Multi-Failure Resilient Replication (MRR) procedure in which the data loss is reduced. In order to deal with the multiple auditing strategy for outsourced data, data integrity is maintained with each data owner and delegating third party auditing (TPA) independently. The proposed work is implemented in MATLAB environment with better security and improved performance. The performance of the proposed work is compared with the existing approaches, which shows a better trade-off in contrast to prevailing approaches.
引用
收藏
页码:43849 / 43870
页数:21
相关论文
共 94 条
[1]  
Walker I(2022)Provable data possession (pdp) and proofs of retrievability (por) of current big user data SN Comput Sci Springer 3 1-9
[2]  
Hewage C(2018)Outsourcing proofs of retrievability IEEE Trans Cloud Comput 9 286-301
[3]  
Jayal A(2020)Blockchain-based dynamic provable data possession for smart cities IEEE Int Things J 7 4143-4154
[4]  
Armknecht F(2020)A blockchain-enabled deduplicatable data auditing mechanism for network storage services IEEE Trans Emerg Top Comput 9 1421-1432
[5]  
Bohli J-M(2018)A similarity-aware encrypted de-duplication scheme with flexible access control in the cloud Future Gener Comput Syst Elsevier 84 177-189
[6]  
Karame G(2017)Publicly verifiable inner product evaluation over outsourced data streams under multiple keys IEEE Trans Serv Comput 10 826-838
[7]  
Li W(2017)Secure auditing and de-duplicating data in cloud IEEE Trans Comput 65 2386-2396
[8]  
Chen R(2017)Public audit and secure de-duplication in cloud storage using BLS signature Res Briefs Inf Commun Technol Evol (ReBICTE) 3 1-10
[9]  
Li Y(2019)Cloud storage auditing with de-duplication supporting different security levels according to data popularity J Network Comput Appl Elsevier 134 26-39
[10]  
Yu Y(2017)Enabling public auditability for operation behaviors in cloud storage Soft Comput Springer 21 2175-2187