Cloud auditing and authentication scheme for establishing privacy preservation

被引:0
|
作者
Bingu, Rajesh [1 ]
Jothilakshmi, S. [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522302, Andhra Pradesh, India
[2] Annamalai Univ, Dept Informat Technol, Chidambaram 608002, Tamil Nadu, India
关键词
Cloud storage; Auditing; Authentication; Duplication; Data integrity; PROTOCOL; ACCESS;
D O I
10.1007/s11042-023-17170-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data duplication. But the unique copy of the original data is stored in the cloud server, and it causes data loss in terms of corruption or missing. It is essential to maintain the duplicate copy of the file and integrity auditing in the field of academic and industrial. The file over the cloud is maintained in a secure or protected manner. This paper proposes cloud auditing with secure file maintenance to retain the duplicate copy of the encrypted file. During the process of public auditing, integrity is maintained for each copy with reduced storage. Secure Authentication with User Anonymity (SAUS) is established with cloud auditing and confidentiality during the process of duplication, and auditing integrity is maintained with encryption approaches. The duplication process is invoked with Multi-Failure Resilient Replication (MRR) procedure in which the data loss is reduced. In order to deal with the multiple auditing strategy for outsourced data, data integrity is maintained with each data owner and delegating third party auditing (TPA) independently. The proposed work is implemented in MATLAB environment with better security and improved performance. The performance of the proposed work is compared with the existing approaches, which shows a better trade-off in contrast to prevailing approaches.
引用
收藏
页码:43849 / 43870
页数:22
相关论文
共 50 条
  • [31] Certificateless Data Integrity Auditing in Cloud Storage with a Designated Verifier and User Privacy Preservation
    Bian, Genqing
    Guo, Xusen
    Li, Rong
    Qu, Wenjing
    Zhao, Yu
    ELECTRONICS, 2022, 11 (23)
  • [32] A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Qiang, Weizhong
    Zou, Deqing
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1210 - 1217
  • [33] An Efficient Privacy Authentication Scheme Based on Cloud Models for Medical Environment
    Ying, Zhaoqin
    Chiou, Shin-Yan
    Liu, Junqiang
    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 628 - 633
  • [34] User Authentication Scheme with Privacy-Preservation for Multi-Server Environment
    Wang, Ren-Chiun
    Juang, Wen-Shenq
    Lei, Chin-Laung
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (02) : 157 - 159
  • [35] An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks
    Jiang, Qi
    Ma, Jianfeng
    Li, Guangsong
    Yang, Li
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1477 - 1491
  • [36] An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks
    Qi Jiang
    Jianfeng Ma
    Guangsong Li
    Li Yang
    Wireless Personal Communications, 2013, 68 : 1477 - 1491
  • [37] A Lightweight and Secure Data Authentication Scheme with Privacy Preservation forWireless Sensor Networks
    Zhong, Hong
    Shao, Lili
    Cui, Jie
    PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 210 - 217
  • [38] An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles
    Liu, Xiaofan
    Qiu, Weihui
    Ren, Wei
    Xu, Caixu
    Choo, Kim-Kwang Raymond
    INTERNET OF THINGS, 2023, 22
  • [39] SACP: A Signcryption-Based Authentication Scheme with Conditional Privacy Preservation for VANET
    Lu, Miao
    Wu, Ying
    Xu, Yuwei
    Yang, Yijie
    Wang, Jingjing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 773 - 779
  • [40] Privacy preservation using novel identity management scheme in cloud computing
    Soni, Dishant
    Patel, Hiren
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 714 - 719