Enhanced Integrity Checking for Preserve Data Owner and User Level Privacy Using Dual Cryptography Approach

Authors

  • Poovizhi. M  ME-Computer Science and Engineering, Dhanalakshmi Srinivasan Engineering College, Perambalur, Tamil Nadu, India
  • Raja. G  Assistant Professor, Dhanalakshmi Srinivasan Engineering College, Perambalur, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT195346

Keywords:

Cloud Framework, Public Auditing, Data Integrity Protection, Double Encryption, Multi User Setting

Abstract

Using Cloud Storage, users can tenuously store their data and enjoy the on-demand great quality applications and facilities from a shared pool of configurable computing resources, without the problem of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained dividing resources. From users’ perspective, including both individuals and IT systems, storing data remotely into the cloud in a flexible on-demand manner brings tempting benefits: relief of the burden for storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc. To securely introduce an effective Sanitizer and third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to capably audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should take in no new vulnerabilities towards user data privacy. In this project, utilize and uniquely combine the public auditing protocols with double encryption approach to achieve the privacy-preserving public cloud data auditing system, which meets all integrity checking without any leakage of data. To support efficient handling of multiple auditing tasks, we further explore the technique of online signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. We can implement double encryption algorithm to encrypt the data twice and stored cloud server in Electronic Health Record applications.

References

  1. G. Ateniese, A. Faonio, and S. Kamara, “Leakage-resilient identification schemes from zero-knowledge proofs of storage,” in IMA Inte. Conf. Cryptography and Coding, 2015, pp. 311–328.
  2. Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Trans. Parallel Distrib. Syst., doi. 10.1109/TPDS. 2015.2506573.
  3. Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Trans. Knowl. Data Eng., vol.23, no.9, pp.1432-1437, 2011.
  4. H. Liu, L. Chen, Z. Davar, and M. Pour, “Insecurity of an efficient privacy-preserving public auditing scheme for cloud data storage,” J. Universal Comput. Sci., vol. 21, no. 3, pp. 473–482, 2015.
  5. J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained twofactor access control for web-Based cloud computing services,” IEEE Trans. Inf. Forens. Security, vol. 11, no. 3, pp. 484–497, 2016.
  6. F. Seb´e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J. J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no.8, pp. 1034–1038, 2008
  7. C. Wang, Q. Wang, S. C, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, 2013.
  8. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), 2010, pp. 1–9.
  9. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, 2015.
  10. L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and Z. Dong, “Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications,” IEEE Trans. Inf. Forens. Security, vol. 10, no. 11, pp. 2352-2364, 2015.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Poovizhi. M, Raja. G, " Enhanced Integrity Checking for Preserve Data Owner and User Level Privacy Using Dual Cryptography Approach, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.138-146, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT195346