1,147 research outputs found

    Secure Dynamic Groups Auditing Service with Group Signature for Cloud Storage

    Get PDF
    Cloud storage has become a commonplace of storing and sharing data across multiple users. It is a challenge to preserve confidentiality and maintain identity privacy while sharing data within multiple dynamic groups, due to frequent change in the membership. Also, maintaining data integrity is an issue as data is stored and audited by untrusted cloud service provider (CSP). In this paper, we propose, third party auditor (TPA) auditing scheme to maintain data integrity and enabling TPA to perform audits for multiple users efficiently and simultaneously. By exploiting group signature scheme any member can anonymously share data within the group. The efficiency and the computation cost of the proposed system are independent with the number of users revoked and the data stored on the cloud. DOI: 10.17762/ijritcc2321-8169.150612

    Privacy Preservation and traceability support using Public Auditing Mechanism

    Get PDF
    as future enhancement, we enhance the Oruta system in two interesting problems we will continue to study for our future work. One of them is traceability, which means the ability for the group manager (i.e., the original user) to reveal the identity of the signer based on verification metadata in some special situations. Since Oruta is based on ring signatures, where the identity of the signer is unconditionally protected, the current design of ours does not support traceability. To the best of our knowledge, designing an efficient public auditing mechanism with the capabilities of preserving identity privacy and supporting traceability is still open. Another problem for our future work is how to prove data freshness (prove the cloud possesses the latest version of shared data) while still preserving identity privacy

    Data Auditing and Security in Cloud Computing: Issues, Challenges and Future Directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discussed

    Factors driving enterprise adoption of blockchain technology

    Get PDF
    Amidst the rapidly evolving advancement of blockchain technology (BT), enterprises face notable challenges in leveraging its transformative potential, starting with a need to understand the technology and how it can be used for particular applications. Two challenges are that many BT trials have not been successful and large-scale implementations that have led to continued use are scarce. This research provides a comprehensive examination of factors that drive the successful adoption of BT for enterprise use cases. A dual-phased approach was employed. First, I introduce a taxonomy matrix correlating BT design characteristics with use case characteristics, offering a framework for BT design and benefits across different enterprise contexts. Second, I conducted case studies of five successful BT cases in large enterprises that led to the adoption in terms of continued use and contrasted them with one failure case. The data collection and analysis of the case studies encompassed technological, organizational, environmental, and inter-organizational variables that led to BT\u27s continued use. The cross-case analysis revealed that compatibility, relative advantage, and observability are primary technological factors contributing to continued use. Within the organizational dimension, organizational knowledge and internal characteristics emerged as crucial elements, while regulatory compliance came out to be a significant factor. Based on the cross-case analysis, I develop theoretical propositions about the factors that lead to the continued use of BT, which can be further validated and tested in future research

    Data auditing and security in cloud computing: issues, challenges and future directions

    Get PDF
    Cloud computing is one of the significant development that utilizes progressive computational power and upgrades data distribution and data storing facilities. With cloud information services, it is essential for information to be saved in the cloud and also distributed across numerous customers. Cloud information repository is involved with issues of information integrity, data security and information access by unapproved users. Hence, an autonomous reviewing and auditing facility is necessary to guarantee that the information is effectively accommodated and used in the cloud. In this paper, a comprehensive survey on the state-of-art techniques in data auditing and security are discussed. Challenging problems in information repository auditing and security are presented. Finally, directions for future research in data auditing and security have been discusse

    Security aspects of communications in VANETs

    Get PDF
    The Fourth Industrial Revolution has begun and it promises breakthroughs in Artificial Intelligence, robotics, Machine Learning, Internet of Things, Digital Twin, and many other technologies that tackle advancements in the industries. The trend is headed towards automation and connectivity. In the automotive industry, advancements have been made towards integrating autonomous driving vehicles into Intelligent Transport Systems (ITS) with the use of Vehicular Ad-Hoc Networks (VANETs). The purpose of this type of network is to enable efficient communication between vehicles (V2V communication) or vehicles and infrastructure (V2I communication), to improve driving safety, to avoid traffic congestion, and to better coordinate transport networks. This direction towards limited (or lack of) human intervention implies vulnerability to cyber attacks. In this context, this paper provides a comprehensive classification of related state-of-the-art approaches following three key directions: 1) privacy, 2) authentication and 3) message integrity within VANETs. Discussions, challenges and open issues faced by the current and next generation of vehicular networks are also provided

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view
    corecore