Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography

被引:2
|
作者
Guesmi, Houda [1 ]
Sadiane, Leila Azouz [1 ]
机构
[1] Natl Sch Comp Sci ENSI, CRISTAL LAB, Tunis, Tunisia
关键词
Cloud Computing Security; Cloud Data Storage Security; Identity Based Encryption; Pairing Cryptography; Cloud Storage System;
D O I
10.1109/ICSEng.2017.32
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper addresses the users' need to trust the commercial cloud providers and the security issues related to data storage in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format represents a security threat. Thus, in this paper, we propose a method relying on the Identity Based Cryptography (IBE) for cloud storage that allows user to store and access the data securely. It also guarantees that only the authenticated client can access the data. This method provides security and privacy for data stored in public servers.
引用
收藏
页码:324 / 330
页数:7
相关论文
共 50 条
  • [31] Identity-based data storage scheme with anonymous key generation in fog computing
    Zhang, Jianhong
    Bai, Wenle
    Wang, Xianmin
    SOFT COMPUTING, 2020, 24 (08) : 5561 - 5571
  • [32] Identity-based data storage scheme with anonymous key generation in fog computing
    Jianhong Zhang
    Wenle Bai
    Xianmin Wang
    Soft Computing, 2020, 24 : 5561 - 5571
  • [33] Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 577 - 585
  • [34] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [35] Electronic payment scheme using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 330 - +
  • [36] RFID system security using identity-based cryptography
    Liang, Yan
    Rong, Chunming
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 482 - 489
  • [37] RFID System Security Using Identity-Based Cryptography
    Chen, Youqin
    Chen, Zhide
    Xu, Li
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 460 - 464
  • [38] An identity-based cryptographic scheme for cloud storage applications
    Medhioub, Manel
    Hamdi, Mohamed
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2019, 10 (02) : 93 - 104
  • [39] Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health
    Mittal, Shikha
    Bansal, Ankit
    Gupta, Deepali
    Juneja, Sapna
    Turabieh, Hamza
    Elarabawy, Mahmoud M.
    Sharma, Ashish
    Bitsue, Zelalem Kiros
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [40] Using Identity-Based Secret Public Keys Cryptography for Heuristic Security Analyses in Grid Computing
    Kamali, Seyed Hossein
    Hedayati, Maysam
    Shakerian, Reza
    Ghasempour, Saber
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2011, 3 (04): : 357 - 375