Cloud auditing and authentication scheme for establishing privacy preservation

被引:0
|
作者
Rajesh Bingu
S. Jothilakshmi
机构
[1] Koneru Lakshmaiah Education Foundation,Department of CSE
[2] Annamalai University,Department of Information Technology
来源
关键词
Cloud storage; Auditing; Authentication; Duplication; Data integrity;
D O I
暂无
中图分类号
学科分类号
摘要
Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data duplication. But the unique copy of the original data is stored in the cloud server, and it causes data loss in terms of corruption or missing. It is essential to maintain the duplicate copy of the file and integrity auditing in the field of academic and industrial. The file over the cloud is maintained in a secure or protected manner. This paper proposes cloud auditing with secure file maintenance to retain the duplicate copy of the encrypted file. During the process of public auditing, integrity is maintained for each copy with reduced storage. Secure Authentication with User Anonymity (SAUS) is established with cloud auditing and confidentiality during the process of duplication, and auditing integrity is maintained with encryption approaches. The duplication process is invoked with Multi-Failure Resilient Replication (MRR) procedure in which the data loss is reduced. In order to deal with the multiple auditing strategy for outsourced data, data integrity is maintained with each data owner and delegating third party auditing (TPA) independently. The proposed work is implemented in MATLAB environment with better security and improved performance. The performance of the proposed work is compared with the existing approaches, which shows a better trade-off in contrast to prevailing approaches.
引用
收藏
页码:43849 / 43870
页数:21
相关论文
共 50 条
  • [1] Cloud auditing and authentication scheme for establishing privacy preservation
    Bingu, Rajesh
    Jothilakshmi, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (15) : 43849 - 43870
  • [2] Stateless Cloud Auditing Scheme for Non-Manager Dynamic Group Data With Privacy Preservation
    Yang, Xiaodong
    Wang, Meiding
    Wang, Xiuxiu
    Chen, Guilan
    Wang, Caifen
    [J]. IEEE ACCESS, 2020, 8 : 212888 - 212903
  • [3] A Lightweight Authentication and Privacy Preservation Scheme for MQTT
    Tian, Sijia
    Vassilakis, Vassilios G.
    [J]. 38TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2023, 2023, : 1289 - 1292
  • [4] On the Efficiency of a Lightweight Authentication and Privacy Preservation Scheme for MQTT
    Tian, Sijia
    Vassilakis, Vassilios G.
    [J]. ELECTRONICS, 2023, 12 (14)
  • [5] A lightweight authentication scheme with privacy preservation for vehicular networks
    Rawat, Gopal Singh
    Singh, Karan
    Arshad, Noreen Izza
    Hadidi, Komeil
    Ahmadian, Ali
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [6] Privacy preserving model: a new scheme for auditing cloud stakeholders
    Razaque, Abdul
    Rizvi, Syed S.
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
  • [7] Privacy preserving model: a new scheme for auditing cloud stakeholders
    Abdul Razaque
    Syed S. Rizvi
    [J]. Journal of Cloud Computing, 6
  • [8] A Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Chiang, Mao-Lun
    Shih, Tzay-Farn
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (11)
  • [9] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    [J]. Chinese Journal of Electronics, 2018, 27 (01) : 41 - 45
  • [10] A Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chin-Ling Chen
    Tsai-Tung Yang
    Mao-Lun Chiang
    Tzay-Farn Shih
    [J]. Journal of Medical Systems, 2014, 38