Open Access
Subscription Access
Open Access
Subscription Access
Public Auditing Using Identity Based Cryptosystems on Multi-Copy Data Integrity in Cloud
Subscribe/Renew Journal
Cloud computing relies on a reliable and secure storage system. A cloud auditing technique is used by customers to ensure that their information is safe and secure while being stored in the cloud. However, no matter how sophisticated the auditing procedures are, cloud auditing will be rendered useless if the cloud service provider (CSP) learns in order of obtaining the secret key. The secret keys of auditing is prevented if it occur, the damage must be minimised. Cloud auditing is resistant on the Public Key Infrastructure (PKI) and face difficulties in managing and verifying certificates. In addition, these techniques require a lot of computing time to data block integrity. Although certificates are eliminated, the damage caused by key disclosure is limited preceding the identity-based schemes. In this paper, we develop a bilinear pairings based Identity-based cloud auditing, where the system is set up using the PDP model. Neither the key update time nor the number of time periods affect the algorithm execution time. The public keys are all the same. This strategy reduces the calculation time for blockless verification. Second, the client constant monitoring of audit reports ensures that the TPA does not get any information from the stored file. Batch auditing is now planned. As a result, TPA audits become even more efficient.
Keywords
Data Integrity, Public Auditing, Identity Based Cryptosystems
Subscription
Login to verify subscription
User
Font Size
Information
- J. Xue and J. Ma, “Identity-Based Public Auditing for Cloud Storage Systems against Malicious Auditors via Blockchain”, Science China Information Sciences, Vol. 62, No. 3, pp. 32104-32109, 2019.
- S.B. Sangeetha, R. Sabitha and G. Kiruthiga, “Resource Management Framework Using Deep Neural Networks in Multi-Cloud Environment”, Proceedings of International Conference on Operationalizing Multi-Cloud Environments, pp. 89-104, 2022.
- X. Zhang and C. Xu, “Identity-Based Key-Exposure Resilient Cloud Storage Public Auditing Scheme from Lattices”, Information Sciences, Vol. 472, pp. 223-234, 2019.
- Y. Zhang and H. Zhang, “Authorized Identity-Based Public Cloud Storage Auditing Scheme with Hierarchical Structure for Large-Scale User Groups”, China Communications, Vol. 15, No. 11, pp. 111-121, 2018.
- X. Zhang and C. Xu, “Identity-Based Proxy-Oriented Outsourcing with Public Auditing in Cloud-Based Medical Cyber-Physical Systems”, Pervasive and Mobile Computing, Vol. 56, pp. 18-28, 2019.
- H. Yan and W. Gui, “Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage with User Privacy Preserving”, IEEE Access, Vol. 9, pp. 45822-45831, 2021.
- K. Praghash and T. Karthikeyan, “Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm”, Wireless Personal Communications, Vol. 87, pp. 1-16, 2021.
- J. Zhang, Z. Sun and J. Mao, “Genuine and Secure Identity-Based Public Audit for the Stored Data in Healthcare Cloud”, Journal of Healthcare Engineering, Vol. 2018, pp. 1-9, 2018.
- L. Liu and L. Wang, “Analysis of One Identity-Based Integrity Auditing and Data Sharing Scheme”, International Journal of Electronics and Information Engineering, Vol. 12, No. 3, pp. 105-111, 2020.
- R. Rabaninejad, M.R. Asaar and M.R. Aref, “An Identity-Based Online/Offline Secure Cloud Storage Auditing Scheme”, Cluster Computing, Vol. 23, No. 2. pp. 1455-1468, 2020.
- J. Zhao and K. Chen, “Secure and Efficient Privacy-Preserving Identity-based Batch Public Auditing with Proxy Processing”, KSII Transactions on Internet and Information Systems, Vol. 13, No. 2, pp. 1043-1063, 2019.
- T. Karthikeyan, K. Praghash and K.H. Reddy, “Binary Flower Pollination (BFP) Approach to Handle the Dynamic Networking Conditions to Deliver Uninterrupted Connectivity”, Wireless Personal Communications, Vol. 121, No. 4, pp. 3383-3402, 2021.
- T. Karthikeyan and K. Praghash, “Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) Using Opposition Frog Leaping Algorithm to Resist Man-in-Middle Attack”, Wireless Personal Communications, Vol. 123, pp. 1715-1731, 2022.
- K. Praghash and T. Karthikeyan, “An Investigation of Garbage Disposal Electric Vehicles (GDEVs) Integrated with Deep Neural Networking (DNN) and Intelligent Transportation System (ITS) in Smart City Management System (SCMS)”, Wireless Personal Communications, Vol. 123, pp. 1733-1752, 2022.
- T. Shang and X. Lu, “Identity-Based Dynamic Data Auditing for Big Data Storage”, IEEE Transactions on Big Data, Vol. 7, No. 6, pp. 913-921, 2019.
- J. Li, H. Yan and Y. Zhang, “Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage”, IEEE Systems Journal, Vol. 15, No. 1, pp. 577-585, 2020.
- Y. Ji and B. Bian, “Flexible Identity-Based Remote Data Integrity Checking for Cloud Storage with Privacy Preserving Property”, Cluster Computing, Vol. 25, pp. 337-349, 2021.
- R. Rabaninejad, M.R. Asaar and M.R. Aref, “A Lightweight Identity-Based Provable Data Possession Supporting Users’ Identity Privacy and Traceability”, Journal of Information Security and Applications, Vol. 51, pp. 102454-102465, 2020.
Abstract Views: 146
PDF Views: 1