1,022 research outputs found

    Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.Remote data integrity checking (RDIC) enables a data storage server, such as a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of RDIC protocols have been proposed in the literature, but almost all the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing and managing the public key authentication framework in PKI based RDIC schemes. We formalize ID-based RDIC and its security model including security against a malicious cloud server and zero knowledge privacy against a third party verifier. We then provide a concrete construction of ID-based RDIC scheme which leaks no information of the stored files to the verifier during the RDIC process. The new construction is proven secure against the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed new protocol is provably secure and practical in the real-world applications.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), Fok Ying Tung Education Foundation (141065), Program for New Century Excellent Talents in Fujian University (JA1406

    Effective Cloud-Based Strategies For Managing Online Reputations

    Get PDF
    Leasing computing resources are now feasible thanks to the Infrastructure as a Service (IaaS) concept made available by cloud computing. In spite of the fact that leased computing resources provide a more financially advantageous answer to the requirements of virtual networks, customers are reluctant to make use of them due to low levels of trust in these resources. Multi-tenancy is a method for reducing operating expenses by allocating a single set of computer resources to serve the needs of several users simultaneously. The fact that computer resources and communication methods are being shared gives rise to concerns over the security and integrity of the data. Since the users are anonymous, it may be difficult for a person to decide who among their neighbours can be trusted. This may make it difficult for an individual to choose a place to live. It is very necessary to have faith in the capacity of the cloud provider (CP) to match customers with dependable co-tenants. Yet, it is in the CP's best interest to make the most of the usage of the resources. So, it enables the maximum possible degree of co-tenancy, which is unaffected by the actions of the user. We provide a powerful reputation management system that pays CPs for discriminating between genuine and malicious users. This prevents resource sharing across CPs in a federated cloud environment, which is one of the goals of our system. Through a combination of theoretical and empirical research, we demonstrate that the proposed method for managing reputations is effective and legitimate

    Empowering Auditing Scheme through more Security signatures in cloud computing

    Get PDF
    Maintaining data determined quality in public cloud acts an essential measure in cloud computing. Cloud storage auditing settles the multifaceted nature of data dependability in public cloud. In advance auditing protocols are all standard on the announcement that the customer's private key for auditing is totally secured. Nonetheless, such proclamation most likely won't for untouched be seized, in light of the presumably weak rationale of insurance or potentially low security settings at the customer. In the event that such a mystery key for auditing is revealed, almost every one of the current auditing protocols would unquestionably form into unable toward effort. In this paper, we meeting point happening this new part of cloud storage auditing. We analyze how to diminish harm of the customer's key scope in cloud storage auditing, and give the essential sensible answer for this unique trouble setting. We commend the significance and the shelter model of auditing convention with key-scope adaptability and propose such a convention. In our arrangement, we use the preorder traversal method and the twofold tree structure to illuminate the private keys for the buyer. Notwithstanding grow a novel authenticator structure to maintain the forward security and the advantages of lump less obviousness. The asylum verification and the presentation examination demonstrate that our proposed convention is sheltered and capable

    SDVADC: Secure Deduplication and Virtual Auditing of Data in Cloud

    Get PDF
    Over the last few years, deploying data to cloud service for repository is an appealing passion that avoids efforts on significant information sustenance and administration. In distributed repository utilities, deduplication technique is often exploited to minimize the capacity and bandwidth necesseties of amenities by erasing repetitive data and caching only a solitary duplicate of them. Proof-of-Ownership mechanisms authorize any possessor of the identical information to approve to the distributed repository server that he possess the information in a dynamic way. In repository utilities with enormous information, the repository servers may intend to minimize the capacity of cached information, and the customers may want to examine the integrity of their information with a reasonable cost. We propose Secure Deduplication and Virtual Auditing of Data in Cloud (SDVADC) mechanism that realizes integrity auditing and
    corecore