9,004 research outputs found

    A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems

    Full text link
    © 2013 IEEE. Cyber-Physical-Social System (CPSS) provides users secure and high-quality mobile service applications to share and exchange data in the cyberspace and physical world. With the explosive growth of data, it is necessary to introduce cloud storage service, which allows devices frequently resort to the cloud for data storage and sharing, into CPSS. In this paper, we propose a data storage and sharing scheme for CPSS with the help of cloud storage service. Since data integrity assurance is an inevitable problem in cloud storage, we first design a secure and efficient data storage scheme based on the technology of public auditing and bilinear map, which also ensures the security of the verification. In order to meet the real-time and reliability requirements of the CPSS, the rewards of timeliness incentive and effectiveness incentive are considered in the scheme. Secondly, based on the proposed storage scheme and ElGamal encryption, we propose a lightweight access model for users to access the final data processed by cloud server. We formally prove the security of the proposed scheme, and conduct performance evaluation to validate its high efficiency. The experimental results show that the proposed scheme has lower overheads in communication and access as compared to the technique CDS

    Enable Tpa To Perform Audits For Multiple Users Efficiently For Securing Cloud Storage

    Get PDF
    The concept of public audit capability has been planned in the conditions of make certain remotely stored data reliability under different system and security models. To fully make sure the data honesty and save the cloud users’ calculation possessions as well as online burden it is of significant consequence to help public auditing service for cloud data storage so that users may alternative to an independent third-party auditor (TPA) to re-evaluate the outsourced data when needed. The TPA who has know-how and potential that users do not can intermittently check the integrity of all the data stored in the cloud on behalf of the users which provides a much more easier and sensible way for the users to make sure their storage correctness in the cloud. Furthermore in addition to help users to assess the danger of their subscribed cloud data services the audit results from TPA would also be beneficial for the cloud service providers to recover their cloud-based service platform and even serve up for independent negotiation purposes.

    Certificateless public auditing with data privacy preserving for cloud-based smart grid data

    Get PDF
    As the promising next generation power system, smart grid can collect and analyze the grid information in real time, which greatly improves the reliability and efficiency of the grid. However, as smart grid coverage expands, more and more data is being collected. To store and manage the massive amount of smart grid data, the data owners choose to upload the grid data to the cloud for storage and regularly check the integrity of their data. However, traditional public auditing schemes are mostly based on Public Key Infrastructure (PKI) or Identity Based Cryptography (IBC) system, which will lead to complicated certificate management and inherent key escrow problems. We propose a certificateless public auditing scheme for cloud-based smart grid data, which can avoid the above two problems. In order to prevent the disclosure of the private data collected by the smart grid during the phase of auditing, we use the random masking technology to protect data privacy. The security analysis and the performance evaluation show that the proposed scheme is secure and efficient

    MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud

    Get PDF
    Big data and its applications are attracting more and more research interests in recent years. As the new generation distributed computing platform, cloud computing is believed to be the most potent platform. With the data no longer under users\u27 direct control, data security in cloud computing is becoming one of the most obstacles of the proliferation of cloud. In order to improve service reliability and availability, storing multiple replicas along with original datasets is a common strategy for cloud service providers. Public data auditing schemes allow users to verify their outsourced data storage without having to retrieve the whole dataset. However, existing data auditing techniques suffers from efficiency and security problems. First, for dynamic datasets with multiple replicas, the communication overhead for update verification is very large, because verification for each update requires O(logn) communication complexity and update of all replicas. Second, to the best of our knowledge, there is no existing integrity verification schemes can provide public auditing and authentication of block indices at the same time. Without authentication of block indices, the server can build a valid proof based on data blocks other than the block client requested to verify. In order to address these problems, in this paper, we present a novel public auditing scheme named MuR-DPA. The new scheme incorporated a novel authenticated data structure based on the Merkle hash tree, which we name as MR-MHT. For support of full dynamic data updates, authentication of block indices and efficient verification of updates for multiple replicas at the same time, the level values of nodes in MR-MHT are generated in a top-down order, and all replica blocks for each data block are organized into a same replica sub-tree. Compared to existing integrity verification and public auditing schemes, theoretical analysis and experimental results show that the MuR-DPA scheme can not only incur much less communication overhead for both update and verification of datasets with multiple replicas, but also provide enhanced security against dishonest cloud service providers

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view
    • …
    corecore