Enhanced Integrity Checking for Preserve Data Owner and User Level Privacy Using Dual Cryptography Approach
DOI:
https://doi.org/10.32628/CSEIT195346Keywords:
Cloud Framework, Public Auditing, Data Integrity Protection, Double Encryption, Multi User SettingAbstract
Using Cloud Storage, users can tenuously store their data and enjoy the on-demand great quality applications and facilities from a shared pool of configurable computing resources, without the problem of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task, especially for users with constrained dividing resources. From users’ perspective, including both individuals and IT systems, storing data remotely into the cloud in a flexible on-demand manner brings tempting benefits: relief of the burden for storage management, universal data access with independent geographical locations, and avoidance of capital expenditure on hardware, software, and personnel maintenances, etc. To securely introduce an effective Sanitizer and third party auditor (TPA), the following two fundamental requirements have to be met: 1) TPA should be able to capably audit the cloud data storage without demanding the local copy of data, and introduce no additional on-line burden to the cloud user; 2) The third party auditing process should take in no new vulnerabilities towards user data privacy. In this project, utilize and uniquely combine the public auditing protocols with double encryption approach to achieve the privacy-preserving public cloud data auditing system, which meets all integrity checking without any leakage of data. To support efficient handling of multiple auditing tasks, we further explore the technique of online signature to extend our main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. We can implement double encryption algorithm to encrypt the data twice and stored cloud server in Electronic Health Record applications.
References
- G. Ateniese, A. Faonio, and S. Kamara, “Leakage-resilient identification schemes from zero-knowledge proofs of storage,” in IMA Inte. Conf. Cryptography and Coding, 2015, pp. 311–328.
- Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, “Enabling personalized search over encrypted outsourced data with efficiency improvement,” IEEE Trans. Parallel Distrib. Syst., doi. 10.1109/TPDS. 2015.2506573.
- Z. Hao, S. Zhong, and N. Yu, “A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability,” IEEE Trans. Knowl. Data Eng., vol.23, no.9, pp.1432-1437, 2011.
- H. Liu, L. Chen, Z. Davar, and M. Pour, “Insecurity of an efficient privacy-preserving public auditing scheme for cloud data storage,” J. Universal Comput. Sci., vol. 21, no. 3, pp. 473–482, 2015.
- J. K. Liu, M. H. Au, X. Huang, R. Lu, and J. Li, “Fine-grained twofactor access control for web-Based cloud computing services,” IEEE Trans. Inf. Forens. Security, vol. 11, no. 3, pp. 484–497, 2016.
- F. Seb´e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J. J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. Knowl. Data Eng., vol. 20, no.8, pp. 1034–1038, 2008
- C. Wang, Q. Wang, S. C, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, 2013.
- C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), 2010, pp. 1–9.
- Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, 2015.
- L. Zhang, Q. Wu, J. Domingo-Ferrer, B. Qin, and Z. Dong, “Round-efficient and sender-unrestricted dynamic group key agreement protocol for secure group communications,” IEEE Trans. Inf. Forens. Security, vol. 10, no. 11, pp. 2352-2364, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.