Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy

被引:8
|
作者
Ramesh, Dharavath [1 ]
Mishra, Rahul [1 ]
Edla, Damodar Reddy [2 ]
机构
[1] Indian Inst Technol ISM, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Farmagudi 403401, Goa, India
关键词
Secure virtualization; Cloud computing; DMBHT; q-SDH short signature scheme without random oracle;
D O I
10.1007/s13369-016-2357-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the growth of www, cloud computing paradigm has become a massive computing environment as a pay-per-use model to the user with shared pool of resources. It also provides on time demand services from anywhere anytime as instant updating and elasticity with measured services. Along with these services, cloud model has major security concerns as securing crucial data of user and maintaining integrity of VM's disk for consistent updation and retrieval from different sources. To achieve instant and secure migration of VMs, cloud service provider has introduced a concept of virtualization to maintain virtualized servers, OS, storage, etc. To achieve secure virtualization and dynamic updation of data in VM's disks, we introduce a model named secure e-stream cipher-based encryption/decryption as ChaCha20 method for maintaining proper security to the user's sensitive data at cloud data center. To maintain proper integrity and authenticity between VM's disks, a new methodology named dynamic version of dynamic Merkle hash B+ tree (DMBHT) with q-SDH secure short signature without random oracle signature scheme has been introduced. This scheme has efficient rate as erasure code (Tornado-z code) for forming block tag at leaf level of DMBHT. Our proposed methodology along with DMBHT has worst case complexity as instead of O(n) and has better public auditability to attain expeditious and secure modifications with proper updations.
引用
收藏
页码:873 / 883
页数:11
相关论文
共 50 条
  • [31] Dynamic Secure Storage System in Cloud Services
    Rathanam, G. Jeeva
    Sumalatha, M. R.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [32] Secure Gamma Generation For Stream Cipher based on Fuzzy Logic
    Alnajjar, Khaled
    Anikin, Igor
    2020 VI INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND NANOTECHNOLOGY (IEEE ITNT-2020), 2020,
  • [33] A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
    Song, Heqing
    Li, Jifei
    Li, Haoteng
    IEEE ACCESS, 2021, 9 : 63745 - 63751
  • [34] ID-Based Cryptography for Secure Cloud Data Storage
    Kaaniche, Nesrine
    Boudguiga, Aymen
    Laurent, Maryline
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 375 - 382
  • [35] SECURE STORAGE OF COMPUTER NETWORK DATA BASED ON CLOUD COMPUTING
    Jiang, Hongwei
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2023, 24 (04): : 663 - 672
  • [36] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [37] Secure data deletion in cloud storage: a survey
    Hua, Minyao
    Zhao, Yinyuan
    Jiang, Tao
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (02) : 253 - 265
  • [38] Data storage with secure boundary in cloud computing
    Zhu, Shuaishuai
    Han, Yiliang
    ICIC Express Letters, 2014, 8 (09): : 2389 - 2394
  • [39] Secure Data Storage Architecture on Cloud Environments
    Tran Thi Xuan Trang
    Maruyama, Katsuhisa
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 39 - 47
  • [40] A Secure Data Deduplication Scheme for Cloud Storage
    Stanek, Jan
    Sorniotti, Alessandro
    Androulaki, Elli
    Kencl, Lukas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 99 - 118