Cloud auditing and authentication scheme for establishing privacy preservation

被引:0
|
作者
Bingu, Rajesh [1 ]
Jothilakshmi, S. [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522302, Andhra Pradesh, India
[2] Annamalai Univ, Dept Informat Technol, Chidambaram 608002, Tamil Nadu, India
关键词
Cloud storage; Auditing; Authentication; Duplication; Data integrity; PROTOCOL; ACCESS;
D O I
10.1007/s11042-023-17170-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data duplication. But the unique copy of the original data is stored in the cloud server, and it causes data loss in terms of corruption or missing. It is essential to maintain the duplicate copy of the file and integrity auditing in the field of academic and industrial. The file over the cloud is maintained in a secure or protected manner. This paper proposes cloud auditing with secure file maintenance to retain the duplicate copy of the encrypted file. During the process of public auditing, integrity is maintained for each copy with reduced storage. Secure Authentication with User Anonymity (SAUS) is established with cloud auditing and confidentiality during the process of duplication, and auditing integrity is maintained with encryption approaches. The duplication process is invoked with Multi-Failure Resilient Replication (MRR) procedure in which the data loss is reduced. In order to deal with the multiple auditing strategy for outsourced data, data integrity is maintained with each data owner and delegating third party auditing (TPA) independently. The proposed work is implemented in MATLAB environment with better security and improved performance. The performance of the proposed work is compared with the existing approaches, which shows a better trade-off in contrast to prevailing approaches.
引用
收藏
页码:43849 / 43870
页数:22
相关论文
共 50 条
  • [41] A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme
    Xiao, Ke
    Geng, Ziye
    He, Yunhua
    Xu, Gang
    Wang, Chao
    Cheng, Wei
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 542 - 554
  • [42] Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
    Liu, Hongyu
    Chen, Leiting
    Davar, Zahra
    Pour, Mohammad Ramezanian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 473 - 482
  • [43] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    Yang Zhen
    Wang Wenyu
    Huang Yongfeng
    Li Xing
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 179 - 187
  • [44] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    YANG Zhen
    WANG Wenyu
    HUANG Yongfeng
    LI Xing
    Chinese Journal of Electronics, 2019, 28 (01) : 179 - 187
  • [45] Privacy-preserving TPA auditing scheme based on skip list for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    International Journal of Network Security, 2019, 21 (03) : 451 - 461
  • [46] Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system
    Yuan, Yilin
    Zhang, Jianbiao
    Xu, Wanshan
    Li, Zheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10):
  • [47] An Efficient Cloud Auditing Scheme for Data Integrity and Identity-Privacy of Multiple Uploaders
    Al-Odat, Zeyad
    Khan, Samee
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 8 - 13
  • [48] A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing
    Huang, Chanying
    Wei, Songjie
    Yan, Kedong
    Zhang, Gongxuan
    Fu, Anmin
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 260 - 265
  • [49] Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
    He, Debiao
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Wang, Lina
    Shen, Jian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1621 - 1631
  • [50] A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
    Tsai, Jia-Lun
    Lo, Nai-Wei
    IEEE SYSTEMS JOURNAL, 2015, 9 (03): : 805 - 815