Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy

被引:8
|
作者
Ramesh, Dharavath [1 ]
Mishra, Rahul [1 ]
Edla, Damodar Reddy [2 ]
机构
[1] Indian Inst Technol ISM, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Farmagudi 403401, Goa, India
关键词
Secure virtualization; Cloud computing; DMBHT; q-SDH short signature scheme without random oracle;
D O I
10.1007/s13369-016-2357-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the growth of www, cloud computing paradigm has become a massive computing environment as a pay-per-use model to the user with shared pool of resources. It also provides on time demand services from anywhere anytime as instant updating and elasticity with measured services. Along with these services, cloud model has major security concerns as securing crucial data of user and maintaining integrity of VM's disk for consistent updation and retrieval from different sources. To achieve instant and secure migration of VMs, cloud service provider has introduced a concept of virtualization to maintain virtualized servers, OS, storage, etc. To achieve secure virtualization and dynamic updation of data in VM's disks, we introduce a model named secure e-stream cipher-based encryption/decryption as ChaCha20 method for maintaining proper security to the user's sensitive data at cloud data center. To maintain proper integrity and authenticity between VM's disks, a new methodology named dynamic version of dynamic Merkle hash B+ tree (DMBHT) with q-SDH secure short signature without random oracle signature scheme has been introduced. This scheme has efficient rate as erasure code (Tornado-z code) for forming block tag at leaf level of DMBHT. Our proposed methodology along with DMBHT has worst case complexity as instead of O(n) and has better public auditability to attain expeditious and secure modifications with proper updations.
引用
收藏
页码:873 / 883
页数:11
相关论文
共 50 条
  • [1] Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy
    Dharavath Ramesh
    Rahul Mishra
    Damodar Reddy Edla
    Arabian Journal for Science and Engineering, 2017, 42 : 873 - 883
  • [2] An Efficient Stream Cipher Based Secure and Dynamic Updation Method for Cloud Data Centre
    Ramesh, Dharavath
    Mishra, Rahul
    Pandit, Amitesh Kumar
    SOFT COMPUTING SYSTEMS, ICSCS 2018, 2018, 837 : 505 - 516
  • [3] Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network
    Zhang, Wei
    Tang, Shanyu
    Zhang, Liping
    Ma, Zhao
    Song, Jun
    INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2015, 2015
  • [4] A hill cipher-based remote data possession checking in cloud storage
    Chen, Lanxiang
    Guo, Gongde
    Peng, Zhen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 511 - 518
  • [5] The dynamic and secure storage of enterprise financial data based on cloud platform
    Zhang, Li
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2023, 19 (05) : 449 - 462
  • [6] Research on dynamic and secure storage of financial data based on cloud platform
    Li, Jingyi
    WEB INTELLIGENCE, 2021, 19 (04) : 263 - 274
  • [7] Secure data storage in cloud computing to avoiding some cipher text attack
    Swathi, Gundala
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (04): : 843 - 855
  • [8] Secure Cloud Storage of Data
    Dongre, Kirti A.
    Thakur, Roshan Singh
    Abraham, Allan
    2014 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2014,
  • [9] A Novel approach to Secure Cloud Data Storage and Dynamic Data Auditing in a Cloud
    Brindha, K.
    Jeyanthi, N.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [10] Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding
    Sengupta, Binanda
    Ruj, Sushmita
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 107 - 118