Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking with Perfect Data in Public Cloud


Affiliations
1 Department of Computer Applications, Hindusthan College of Arts and Science, India
2 Department of IT, Hindusthan College of Arts and Science, India
     

   Subscribe/Renew Journal


In the present days many users store their significant data in the cloud. Cloud computing is the new range in wireless world. One of the major challenging issues is data integrity/security. To guard knowledge privacy, the sensitive knowledge ought to be encrypted by the information owner before outsourcing that makes the normal and economical plaintext keyword search technique useless. The point of data security which has always been noteworthy aspect of quality, cloud computing cause a new security threats. In cloud storage systems, the server that stores the client’s data is not necessarily trusted. The existing system does not pro ide security mechanisms for storing data in clouds. To overcome these issues a no el proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). For achieving the efficiency of cloud storage, the proposed system pro ides flexible data segmentation with additional authorization process among the three participating parties of client, server and a third-party auditor (TPA). We propose an identity based data storage scheme, it will resist the collusion attacks.

Keywords

Cloud Computing, Identity Based Cryptography, Proxy Public Key Cryptography, Remote Data Integrity Checking.
User
Subscription Login to verify subscription
Notifications
Font Size

  • Z. Fu, X. Sun, Q. Liu, L. Zhou, J. Shu, “Achieving efficient cloud search services: multikeyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, vol. E98-B, no. 1pp.190-200, 2015.
  • Y. Ren, J. Shen, J. Wang, J. Han, S. Lee, “Mutual verifiable pro able data auditing in public cloud storage,” Journal of Internet Technology, vol. 16, no.2, pp.317-323, 2015.
  • H. Guo, Z. Zhang, J. Zhang, “Proxy re-encryption with unforgeable reencryption keys”, Cryptology and Network Security, LNCS 8813, pp. 20-33, 2014.
  • B.Abinaya, Mrs.S.G.Sandhya," Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud, International Journal of Computer Science & Engineering Technology ", ISSN:, vol. 8, No. 03, 2229-3345 2017.
  • E. Kirshanova, “Proxy re-encryption from lattices”, PKC 2014, LNCS 8383, pp. 77-94, 2014
  • . Xu, H. Chen, D. Zou, H. Jin, “Fine-grained and heterogeneous proxy re-encryption for secure cloud storage”, Chinese Science Bulletin, vol.59, no.32, pp. 4201-4209, 2014.
  • M.Sai Sudha ,Soma Shekar , J.Deepthi," Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud" International Journal of Computational Science, Mathematics and Engineering, volume-4, Issue-2, 2349-8439, 2017
  • Q. Wang, C.Wang, K. Ren,W. Lou, and J. Li; “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847-859, May 2011.
  • F. Seb´e, J. Domingo-Ferrer, A. Mart´ınez-Ballest´e, Y. Deswarte, J. Quisquater; “Efficient Remote Data Integrity checking in Critical Information Infrastructures. IEEE Transactions on Knowledge and Data Engineering,” 20(8):1034-1038, 2008.
  • https://www.computerworld.com/article/2505135/cloud-computing/when-there-s-a-third-party-in-the-cloud.html
  • Penchala.Mounika & Mr. Kodam Goutham Raju " Data Integrity And Data Uploading In Cloud With Identity Based Proxy Oriented Encryption", International Journal of Research, Volume 04, 2348-6848 Issue 14, November 2017.
  • Manasa P, Anishree Abhay ," Identity Based Distributed Provable Data Possession A Method Used in Multi Cloud Environment",ijsetr, volume .04, issue.04, 2319-8885, 2015.
  • G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song; “Provable Data Possession at Untrusted Stores,” CCS’07, pp. 598-609, 2007.
  • G. Ateniese, R. DiPietro, L. . Mancini, G. Tsudik; “Scalable and Efficient Provable Data Possession,” SecureComm 2008, article 9, 2008.
  • C. C. Erway, A. Kupcu, C. Papamanthou, R. Tamassia; “Dynamic Provable Data Possession” , CCS’09, 213-222, 2009.

Abstract Views: 250

PDF Views: 4




  • Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking with Perfect Data in Public Cloud

Abstract Views: 250  |  PDF Views: 4

Authors

P. Jayasree
Department of Computer Applications, Hindusthan College of Arts and Science, India
V. Saravanan
Department of IT, Hindusthan College of Arts and Science, India

Abstract


In the present days many users store their significant data in the cloud. Cloud computing is the new range in wireless world. One of the major challenging issues is data integrity/security. To guard knowledge privacy, the sensitive knowledge ought to be encrypted by the information owner before outsourcing that makes the normal and economical plaintext keyword search technique useless. The point of data security which has always been noteworthy aspect of quality, cloud computing cause a new security threats. In cloud storage systems, the server that stores the client’s data is not necessarily trusted. The existing system does not pro ide security mechanisms for storing data in clouds. To overcome these issues a no el proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). For achieving the efficiency of cloud storage, the proposed system pro ides flexible data segmentation with additional authorization process among the three participating parties of client, server and a third-party auditor (TPA). We propose an identity based data storage scheme, it will resist the collusion attacks.

Keywords


Cloud Computing, Identity Based Cryptography, Proxy Public Key Cryptography, Remote Data Integrity Checking.

References