Improved Data Storage Confidentiality in Cloud Computing Using Identity-Based Cryptography

被引:2
|
作者
Guesmi, Houda [1 ]
Sadiane, Leila Azouz [1 ]
机构
[1] Natl Sch Comp Sci ENSI, CRISTAL LAB, Tunis, Tunisia
关键词
Cloud Computing Security; Cloud Data Storage Security; Identity Based Encryption; Pairing Cryptography; Cloud Storage System;
D O I
10.1109/ICSEng.2017.32
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper addresses the users' need to trust the commercial cloud providers and the security issues related to data storage in a cloud storage service. The cloud storage is one of the prominent services offered in cloud computing. Data stored over cloud in the plain text format represents a security threat. Thus, in this paper, we propose a method relying on the Identity Based Cryptography (IBE) for cloud storage that allows user to store and access the data securely. It also guarantees that only the authenticated client can access the data. This method provides security and privacy for data stored in public servers.
引用
收藏
页码:324 / 330
页数:7
相关论文
共 50 条
  • [41] Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
    Yu, Yong
    Au, Man Ho
    Ateniese, Giuseppe
    Huang, Xinyi
    Susilo, Willy
    Dai, Yuanshun
    Min, Geyong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 767 - 778
  • [42] Identity-based cryptography for grid security
    Lim, Hoon Wei
    Paterson, Kenneth G.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 15 - 32
  • [43] Identity-based cryptography for grid security
    Lim, HW
    Paterson, KG
    FIRST INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2005, : 395 - 404
  • [44] Survey of security on identity-based cryptography
    College of Computer Science and Technology, Jilin University, Changchun 130012, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2009, 9 (1537-1548):
  • [45] An Efficient Identity-Based Encryption With Equality Test in Cloud Computing
    Yang, Zhichao
    He, Debiao
    Qu, Longjiang
    Ye, Qing
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2983 - 2992
  • [46] Identity-based encryption with outsourced equality test in cloud computing
    Ma, Sha
    INFORMATION SCIENCES, 2016, 328 : 389 - 402
  • [47] An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
    Meshram, Chandrashekhar
    Lee, Cheng-Chi
    Meshram, Sarita Gajbhiye
    Khan, Muhammad Khurram
    SOFT COMPUTING, 2019, 23 (24) : 13127 - 13138
  • [48] An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
    Chandrashekhar Meshram
    Cheng-Chi Lee
    Sarita Gajbhiye Meshram
    Muhammad Khurram Khan
    Soft Computing, 2019, 23 : 13127 - 13138
  • [49] FORMAL LANGUAGE IDENTITY-BASED CRYPTOGRAPHY
    Vecsi, Adam
    Petho, Attila
    RAD HRVATSKE AKADEMIJE ZNANOSTI I UMJETNOSTI-MATEMATICKE ZNANOSTI, 2021, 25 (546): : 143 - 159
  • [50] Identity-based cryptography for grid security
    Hoon Wei Lim
    Kenneth G. Paterson
    International Journal of Information Security, 2011, 10 : 15 - 32