149 research outputs found

    Dynamic Audit Services for Outsourced Storages in Clouds

    Full text link

    Secure Dynamic Groups Auditing Service with Group Signature for Cloud Storage

    Get PDF
    Cloud storage has become a commonplace of storing and sharing data across multiple users. It is a challenge to preserve confidentiality and maintain identity privacy while sharing data within multiple dynamic groups, due to frequent change in the membership. Also, maintaining data integrity is an issue as data is stored and audited by untrusted cloud service provider (CSP). In this paper, we propose, third party auditor (TPA) auditing scheme to maintain data integrity and enabling TPA to perform audits for multiple users efficiently and simultaneously. By exploiting group signature scheme any member can anonymously share data within the group. The efficiency and the computation cost of the proposed system are independent with the number of users revoked and the data stored on the cloud. DOI: 10.17762/ijritcc2321-8169.150612

    The Secured Client-Side Encrypted Data with Public Auditing in Cloud Storage

    Get PDF
    Cloud computing is rising worldview, empowering clients to remotely store their information in a server and give benefits on-request. In cloud computing cloud clients and cloud specialist organizations are practically sure to be from various put stock in areas. Information security and protection are the basic issues for remote information storage. A protected client authorized information get to control instrument must be given before cloud clients have the freedom to outsource touchy information to the cloud for capacity. Quality based encryption is an open key based encryption that empowers get to control over scrambled information utilizing access strategies and credited properties. In this paper, we are going to investigation different plans for encryption and conceivable answers for their constraints that comprise of Attribute based encryption (ABE), KP-ABE, CP-ABE, and Attribute-based Encryption Scheme with Non-Monotonic Access Structures. HABE.To secure outsourced information in cloud storage against debasements, adding adaptation to non-critical failure to cloud storage together with information trustworthiness checking and disappointment reparation winds up plainly basic. As of late, recovering codes have picked up prevalence because of their lower repair data transmission while giving adaptation to non-critical failure. Broad security investigation demonstrates that our plan is provable secure under arbitrary prophet show and test assessment shows that our plan is very proficient and can be practically coordinated into the recovering code-based cloud storage

    Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification

    Get PDF
    In cloud storage systems, information proprietors have their information on cloud servers furthermore, clients (information customers) can get to the information from cloud servers. Because of the information outsourcing, be that as it may, this new worldview of information facilitating administration additionally presents new security challenges, which requires an autonomous evaluating administration to check the information honesty in the cloud. In huge scale distributed storage frameworks, the information might be refreshed powerfully, so existing remote uprightness checking strategies served for static chronicle information are no longer appropriate to check the information uprightness. Accordingly, a proficient and secure dynamic inspecting convention is wanted to persuade information proprietors that the information is accurately put away in the cloud. In this section, we initially present an evaluating structure for cloud capacity frameworks. At that point, we depict Third-party Auditing Scheme a proficient and security saving evaluating convention for distributed storage, which can likewise bolster information dynamic operations and cluster reviewing for both various proprietors what's more

    A Novel Design to Minimise the Energy Consumption and Node Traversing in Blockchain Over Cloud Using Ensemble Cuckoo Model

    Get PDF
    The article outlines the Blockchain’s behavioral model for services. Their reliability is proven through the use of experimental evidence. The authors highlight the major technical aspects and characteristics that are associated with the transmission of data through the network. The authors define the scheme for the network, which works with blockchain transactions, and the relationship between network characteristics on parameters used by the application. They examine the use of this model to identification of the blockchain service and also the likelihood of existing security mechanisms that are based on the technology being bypassed. Additionally, the article provides guidelines to conceal the Blockchain's traffic profile to make it more difficult for its detection in the information network. This study offers a thorough analysis of blockchain-based trust models applied to cloud computing. The paper highlights the challenges that remain unsolved and offers suggestions for future studies in the area based on new cloud-edge trust management system and double-blockchain structure, which is a cloud-based transaction model. The paper also identifies the existing challenges and offers suggestions for future studies in the area based on new cloud-edge trust management system and double-blockchain structure, which is a cloud-based transaction model. The flow of the network will be supported by models that are enhanced by cuckoo to frame the perfect network transform of data from one point to cluster, or alternatively

    A Framework for Protecting Cloud Users from Third Party Auditors

    Get PDF
    Cloud computing has merged to be a now computing paradigm that lets public to access shared pool of resources without capital investment. The users of cloud need to access resources through Internet in pay per use fashion. Thus there is increased use of storage services of cloud in the real world. This service is known as Infrastructure as a Service (IaaS). However, there are security concerns as this service runs in entrusted environment. To ensure data integrity many public verification or auditing schemes came into existence. Nevertheless, there is a concern when the so called Third Party Auditor (TPA) has malicious intentions. In such cases, protection is required against malicious TPAs. Towards this end, recently, Huang et al. proposed a scheme in which users can directly check the integrity of stored data using a feedback based audit scheme. TPA takes process proof from cloud server and gives feedback to cloud user. The feedback is unforgivable and the TPA cannot make any malicious attacks. Based on this scheme, in this paper, we implemented a prototype application that demonstrates the proof of concept. The empirical results are encouraging. DOI: 10.17762/ijritcc2321-8169.15065

    An Efficient Pdp Scheme For Distributed Cloud Storage To Support Dynamic Scalability On Multiple Storage Servers

    Get PDF
    The confirmation examination without downloading makes it particularly important for large-size files and folders typically including many clients’ files to make sure whether these data have been tampered with or deleted without downloading the latest version of data. Provable data possession is such a probabilistic proof technique for a storage provider to establish the integrity and ownership of clients’ data without downloading data. Consequently it is able to put back traditional hash and signature functions in storage outsourcing. Various PDP schemes have been recently proposed such as Scalable PDP and Dynamic PDP. Though these schemes mainly focus on PDP issues at untrusted servers in a single cloud storage provider and are not appropriate for a multi-cloud environment.  Furthermore clients need to know the exact position of each file block in a multi-cloud environment.  The confirmation process in such a case will lead to high communication overheads and calculation costs at client sides as well. Consequently it is of utmost necessary to design a cooperative PDP model to decrease the storage and network overheads and improve the transparency of verification activities in cluster-based cloud storage systems. A cooperative PDP scheme should give features for timely detecting abnormality and renewing multiple copies of data

    Data Integrity in Multi Cloud Storage

    Get PDF
    Data integrity in cloud is became an acceptable challenge in the research community because of its vast application and usability in common people. This paper given an idea and ensure the secure and less loss in data during sharing with different user residing worldwide. We have introduced a new scheme called PDP (Provable Data Possession) scheme for distributed cloud storage to support the scalability of service and data migration. Here we have the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data.   We also introduce an another scheme called  (CPDP) i.e. cooperative PDP which is based on homomorphic verifiable response and hash index hierarchy. We prove that the proposed scheme is minimizing the computational error as well as decrease the communication overhead as compare with existing methods

    Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy

    Full text link
    Cloud storage services have become accessible and used by everyone. Nevertheless, stored data are dependable on the behavior of the cloud servers, and losses and damages often occur. One solution is to regularly audit the cloud servers in order to check the integrity of the stored data. The Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy presented in ACISP'15 is a straightforward design of such solution. However, this scheme is threatened by several attacks. In this paper, we carefully recall the definition of this scheme as well as explain how its security is dramatically menaced. Moreover, we proposed two new constructions for Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy based on the scheme presented in ACISP'15, one using Index Hash Tables and one based on Merkle Hash Trees. We show that the two schemes are secure and privacy-preserving in the random oracle model.Comment: ISPEC 201
    corecore