Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography

被引:2
|
作者
Guesmi, Houda [1 ]
Sadiane, Leila Azouz [1 ]
机构
[1] Natl Sch Comp Sci ENSI, CRISTAL LAB, Tunis, Tunisia
关键词
Cloud Computing Security; Cloud Data Storage Security; Identity Based Encryption; Pairing Cryptography; Cloud Storage System;
D O I
10.1109/ICSEng.2017.32
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper addresses the users' need to trust the commercial cloud providers and the security issues related to data storage in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format represents a security threat. Thus, in this paper, we propose a method relying on the Identity Based Cryptography (IBE) for cloud storage that allows user to store and access the data securely. It also guarantees that only the authenticated client can access the data. This method provides security and privacy for data stored in public servers.
引用
收藏
页码:324 / 330
页数:7
相关论文
共 50 条
  • [21] A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing
    Shen, Jian
    Liu, Dengzhi
    Lai, Chin-Feng
    Ren, Yongjun
    Sun, Xingming
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 833 - 842
  • [22] Introduction to identity-based cryptography
    Joux, Antoine
    Cryptology and Information Security Series, 2009, 2 : 1 - 12
  • [23] Identity-based cryptography for grid
    Li, Hongwei
    Sun, Shixin
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 132 - +
  • [24] Identity-Based Encryption with Outsourced Revocation in Cloud Computing
    Li, Jin
    Li, Jingwei
    Chen, Xiaofeng
    Jia, Chunfu
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (02) : 425 - 437
  • [25] Identity-Based Authenticated Encryption with Identity Confidentiality
    Zhao, Yunlei
    COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 633 - 653
  • [26] Identity-based authenticated encryption with identity confidentiality
    Shen, Shiyu
    Wang, Hongbing
    Zhao, Yunlei
    THEORETICAL COMPUTER SCIENCE, 2022, 901 : 1 - 18
  • [27] Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
    Liu, Zhangyun
    Liao, Yongjian
    Yang, Xiaowei
    He, Yichuan
    Zhao, Kun
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 128 - 135
  • [28] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [29] An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1359 - 1371
  • [30] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83