Enhanced Public Auditability & Secure Data Storage in Cloud Computing

被引:0
|
作者
Chakraborty, Tamal Kanti [1 ]
Dhami, Anil [1 ]
Bansal, Prakhar [1 ]
Singh, Tripti [1 ]
机构
[1] Motilal Nehru Natl Inst Technol Allahabad, Dept Comp Sci & Engn, Allahabad, Uttar Pradesh, India
关键词
Cloud computing; Data security; Elliptic curve cryptography (ECC);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the most envisioned paradigm shift in the computing world. Its services are being applied in several IT scenarios. This unique platform has brought new security issues to contemplate. This paper proposes a homomorphic encryption scheme based on the Elliptic curve cryptography. It implements a provable data possession scheme to support dynamic operation on data. The application of proof of retrievability scheme provisioned the client to challenge integrity of the data stored. The notion of a third party auditor (TPA) is considered, who verifies and modifies the data on behalf of the client. Data storage at the server is done using a Merkle hash tree (MHT) accomplishing faster data access. This proffered scheme not only checks the data storage correctness but also identifies misbehaving servers. The initial results demonstrate its effectiveness as an improved security system for data storage compared to the existing ones in most prospects.
引用
收藏
页码:101 / 105
页数:5
相关论文
共 50 条
  • [31] Public Auditing for Big Data Storage in Cloud Computing -- A Survey
    Liu, Chang
    Ranjan, Rajiv
    Zhang, Xuyun
    Yang, Chi
    Georgakopoulos, Dimitrios
    Chen, Jinjun
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 1128 - 1135
  • [32] Secure Deduplication on Public Cloud Storage
    Graupner, Hendrik
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Meinel, Christoph
    ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 34 - 41
  • [33] New Secure Storage Architecture for Cloud Computing
    Almulla, Sameera Abdulrahman
    Yeun, Chan Yeob
    FUTURE INFORMATION TECHNOLOGY, PT 1, 2011, 184 : 75 - 84
  • [34] Secure public data auditing scheme for cloud storage in smart city
    Libing Wu
    Jing Wang
    Neeraj Kumar
    Debiao He
    Personal and Ubiquitous Computing, 2017, 21 : 949 - 962
  • [35] Secure public data auditing scheme for cloud storage in smart city
    Wu, Libing
    Wang, Jing
    Kumar, Neeraj
    He, Debiao
    PERSONAL AND UBIQUITOUS COMPUTING, 2017, 21 (05) : 949 - 962
  • [37] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [38] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [39] Secure cloud computing for genomic data
    Datta, Somalee
    Bettinger, Keith
    Snyder, Michael
    NATURE BIOTECHNOLOGY, 2016, 34 (06) : 588 - 591
  • [40] Secure cloud computing for genomic data
    Somalee Datta
    Keith Bettinger
    Michael Snyder
    Nature Biotechnology, 2016, 34 : 588 - 591