Complete Privacy Preserving Auditing for Data Integrity in Cloud Computing

被引:5
|
作者
Ramaiah, Y. Govinda [1 ]
Kumari, G. Vijaya [1 ]
机构
[1] JNTUH Coll Engn, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
关键词
cloud computing; homomorphic encryption; auditing; data integrity; privacy; security; PROOFS;
D O I
10.1109/TrustCom.2013.191
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption has long been acclaimed solution for data security and privacy problems in cloud computing. However, the high complexities of operations associated with the existing schemes have prohibited them from being used for practical applications. In this paper we propose a new protocol for verifying the integrity of the data stored at the remote cloud server, based on a practical version of integers based homomorphic encryption. The proposal is the first attempt in combining the data integrity and confidentiality in new ways to provide an impending solution. The practicality of the resulting scheme is demonstrated through exhaustive experimentation while the security of the scheme is proved with thorough cryptanalysis.
引用
收藏
页码:1559 / 1566
页数:8
相关论文
共 50 条
  • [1] Privacy-preserving public auditing for data integrity in cloud
    Saleem, M. Shaik
    Murali, M.
    [J]. PROCEEDINGS OF THE 10TH NATIONAL CONFERENCE ON MATHEMATICAL TECHNIQUES AND ITS APPLICATIONS (NCMTA 18), 2018, 1000
  • [2] Privacy-Preserving Public Auditing in Cloud Computing with Data Deduplication
    Alkhojandi, Naelah
    Miri, Ali
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 35 - 48
  • [3] A Survey on Data Auditing Approaches to Preserve Privacy and Data Integrity in Cloud Computing
    Kavya, V
    Sumathi, R.
    Shwetha, A. N.
    [J]. SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 108 - 118
  • [4] A Novel Data Auditing Approach to Achieve Data Privacy and Data Integrity in Cloud Computing
    Hiremath, Shivarajkumar
    Kunte, Sanjeev
    [J]. 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 306 - 310
  • [5] Privacy Preserving Data Auditing Protocol for Secure Storage in Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2725 - 2729
  • [6] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Kim, Daeyeong
    Kwon, Hyunsoo
    Hahn, Changhee
    Hur, Junbeom
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13077 - 13091
  • [7] Privacy preserving auditing for shared data in cloud
    Ghutugade, Kalyani B.
    Patil, G. A.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 300 - 305
  • [8] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [9] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Daeyeong Kim
    Hyunsoo Kwon
    Changhee Hahn
    Junbeom Hur
    [J]. Multimedia Tools and Applications, 2016, 75 : 13077 - 13091
  • [10] Preserving Privacy in Public Auditing for Shared Cloud Data
    Anjali, R. S.
    Ravikumar, Aswathy
    [J]. 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 11 - 16