2,214 research outputs found
Fuzzy identity-based data integrity auditing for reliable cloud storage systems
This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention. Data auditing protocols enable
a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated
with existing designs of data auditing protocols is the complexity in key management. In this paper, we seek to address the complex
key management challenge in cloud data integrity checking by introducing fuzzy identity-based auditing-the first in such an approach,
to the best of our knowledge. More specifically, we present the primitive of fuzzy identity-based data auditing, where a user’s identity
can be viewed as a set of descriptive attributes. We formalize the system model and the security model for this new primitive. We then
present a concrete construction of fuzzy identity-based auditing protocol by utilizing biometrics as the fuzzy identity. The new protocol
offers the property of error-tolerance, namely, it binds private key to one identity which can be used to verify the correctness of a
response generated with another identity, if and only if both identities are sufficiently close. We prove the security of our protocol based
on the computational Diffie-Hellman assumption and the discrete logarithm assumption in the selective-ID security model. Finally, we
develop a prototype implementation of the protocol which demonstrates the practicality of the proposal.This work is
supported by the National Natural Science Foundation of
China (61501333,61300213,61272436,61472083), the Fundamental
Research Funds for the Central Universities under
Grant ZYGX2015J05
An extensive research survey on data integrity and deduplication towards privacy in cloud storage
Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. Apart from various security concerns, data privacy is still one of the unsolved problems in this regards. The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of resistance against all form of dynamic threats over cloud and internet systems. Therefore, data integrity, as well as data deduplication is such associated phenomena which influence data privacy. Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. The manuscript also contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems
Recommended from our members
Data integrity auditing without private key storage for secure cloud storage
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed. In most, if not all, of the existing schemes, a user needs to employ his private key to generate the data authenticators for realizing the data integrity auditing. Thus, the user has to possess a hardware token (e.g. USB token, smart card) to store his private key and memorize a password to activate this private key. If this hardware token is lost or this password is forgotten, most of the current data integrity auditing schemes would be unable to work. In order to overcome this problem, we propose a new paradigm called data integrity auditing without private key storage and design such a scheme. In this scheme, we use biometric data (e.g. iris scan, fingerprint) as the user's fuzzy private key to avoid using the hardware token. Meanwhile, the scheme can still effectively complete the data integrity auditing.We utilize a linear sketch with coding and error correction processes to confirm the identity of the user. In addition, we design a new signature scheme which not only supports blockless verifiability, but also is compatible with the linear sketch. The security proof and the performance analysis show that our proposed scheme achieves desirable security and efficiency
Future Trends and Directions for Secure Infrastructure Architecture in the Education Sector: A Systematic Review of Recent Evidence
The most efficient approach to giving large numbers of students’ access to computational resources is through a data center. A contemporary method for building the data center\u27s computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher examines potential directions and trends for a secured infrastructure design in this article. Additionally, interoperable, highly reusable modules that can include the newest trends in the education industry are made possible by cloud-based educational software. The Reference Architecture for University Education System Using AWS Services is presented in the paper. In conclusion, automation boosts efficiency by 20% while decreasing researcher involvement in kinetics modeling using CHEMKIN by 10%. Future work will focus on integrating GPUs into open-source programs that will be automated and shared on CloudFlame as a service resource for cooperation in the educational sector
- …