3,650 research outputs found

    Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.Remote data integrity checking (RDIC) enables a data storage server, such as a cloud server, to prove to a verifier that it is actually storing a data owner’s data honestly. To date, a number of RDIC protocols have been proposed in the literature, but almost all the constructions suffer from the issue of a complex key management, that is, they rely on the expensive public key infrastructure (PKI), which might hinder the deployment of RDIC in practice. In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing and managing the public key authentication framework in PKI based RDIC schemes. We formalize ID-based RDIC and its security model including security against a malicious cloud server and zero knowledge privacy against a third party verifier. We then provide a concrete construction of ID-based RDIC scheme which leaks no information of the stored files to the verifier during the RDIC process. The new construction is proven secure against the malicious server in the generic group model and achieves zero knowledge privacy against a verifier. Extensive security analysis and implementation results demonstrate that the proposed new protocol is provably secure and practical in the real-world applications.This work is supported by the National Natural Science Foundation of China (61501333,61300213,61272436,61472083), Fok Ying Tung Education Foundation (141065), Program for New Century Excellent Talents in Fujian University (JA1406

    An extensive research survey on data integrity and deduplication towards privacy in cloud storage

    Get PDF
    Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. Apart from various security concerns, data privacy is still one of the unsolved problems in this regards. The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of resistance against all form of dynamic threats over cloud and internet systems. Therefore, data integrity, as well as data deduplication is such associated phenomena which influence data privacy. Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. The manuscript also contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems

    Implementation of Dynamic Virtual Cloud Architecture for Privacy Data Storage

    Get PDF
    Nowadays rapidly developing technologies, cloud computing offers versatile services. However, cloud computing presents a challenge to secure information sharing. Customers can securely share their data with others and remotely store it in the cloud using cloud storage services. In recent times, cloud storage typically represents as the primary method of external data storage. The primary challenge is safeguarding the cloud-based data against attacks. Over the information network, the growth of private or semi-private information has increased. The search techniques have not been addressed by privacy safeguards. As there is no suitable audit system, the validity of the stored data has become in question. In addition, user authentication presents additional difficulties. Hence in order to solve these issues, Design and implementation of dynamic virtual cloud architecture for privacy data storage is presented. In this approach, third-party audits are presented accompanied a new, regenerative public audit methodology. A distributed KDC (Key Distribution Center) is employed to encrypt the data. Documents can be stored on a private server in plain word form, which compromise the protection of privacy. As a result, system security can be improved to make the documents safer and more effective. The main objective of this Virtual Cloud Architecture is to achieve data confidentiality, as well as authenticity.&nbsp

    The Secured Client-Side Encrypted Data with Public Auditing in Cloud Storage

    Get PDF
    Cloud computing is rising worldview, empowering clients to remotely store their information in a server and give benefits on-request. In cloud computing cloud clients and cloud specialist organizations are practically sure to be from various put stock in areas. Information security and protection are the basic issues for remote information storage. A protected client authorized information get to control instrument must be given before cloud clients have the freedom to outsource touchy information to the cloud for capacity. Quality based encryption is an open key based encryption that empowers get to control over scrambled information utilizing access strategies and credited properties. In this paper, we are going to investigation different plans for encryption and conceivable answers for their constraints that comprise of Attribute based encryption (ABE), KP-ABE, CP-ABE, and Attribute-based Encryption Scheme with Non-Monotonic Access Structures. HABE.To secure outsourced information in cloud storage against debasements, adding adaptation to non-critical failure to cloud storage together with information trustworthiness checking and disappointment reparation winds up plainly basic. As of late, recovering codes have picked up prevalence because of their lower repair data transmission while giving adaptation to non-critical failure. Broad security investigation demonstrates that our plan is provable secure under arbitrary prophet show and test assessment shows that our plan is very proficient and can be practically coordinated into the recovering code-based cloud storage

    Survey on securing data storage in the cloud

    Get PDF
    Cloud Computing has become a well-known primitive nowadays; many researchers and companies are embracing this fascinating technology with feverish haste. In the meantime, security and privacy challenges are brought forward while the number of cloud storage user increases expeditiously. In this work, we conduct an in-depth survey on recent research activities of cloud storage security in association with cloud computing. After an overview of the cloud storage system and its security problem, we focus on the key security requirement triad, i.e., data integrity, data confidentiality, and availability. For each of the three security objectives, we discuss the new unique challenges faced by the cloud storage services, summarize key issues discussed in the current literature, examine, and compare the existing and emerging approaches proposed to meet those new challenges, and point out possible extensions and futuristic research opportunities. The goal of our paper is to provide a state-of-the-art knowledge to new researchers who would like to join this exciting new field

    Multi OwnerSecret Key Generation for Ranked Multi-Keyword Search in Cloud

    Get PDF
    For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they support multiple owners to share the benefits brought by cloud computing. The issue of recovering the encrypted data over the cloud is mind boggling. Numerous search procedures are utilized for recovering the scrambled data from cloud. This paper axes around an arrangement of keyword Search instruments over encrypted data, which gives secured data recovery high proficiency. Search over encrypted data is a method of extraordinary enthusiasm for the cloud computing time, in light of the fact that numerous trust that delicate data must be scrambled before outsourcing to the cloud servers with a specific end goal to guarantee client data security. Concocting a productive and secure search scheme over scrambled data includes strategies from ple spaces. It presumes that, keyword search is intended to be best methodology for searching the encrypted data in the Cloud. It gives more productivity than single keyword search

    Verifiable Secret Key Generation for Ranked Multi-Keyword Search in Cloud

    Get PDF
    Cloud storage is exceptionally well known in ongoing pattern as it gives more advantages over the customary storage arrangements. To guarantee security in cloud, encryption methods assume a noteworthy part when data are outsourced to the cloud. The issue of recovering the encrypted data over the cloud is mind boggling. Numerous search procedures are utilized for recovering the scrambled data from cloud. This paper axes around an arrangement of keyword Search instruments over encrypted data, which gives secured data recovery high proficiency. Search over encrypted data is a method of extraordinary enthusiasm for the cloud computing time, in light of the fact that numerous trust that delicate data must be scrambled before outsourcing to the cloud servers with a specific end goal to guarantee client data security. Concocting a productive and secure search scheme over scrambled data includes strategies from ple spaces. It presumes that, keyword search is intended to be best methodology for searching the encrypted data in the Cloud. It gives more productivity than single keyword search

    Data storage security and privacy in cloud computing: A comprehensive survey

    Get PDF
    Cloud Computing is a form of distributed computing wherein resources and application platforms are distributed over the Internet through on demand and pay on utilization basis. Data Storage is main feature that cloud data centres are provided to the companies/organizations to preserve huge data. But still few organizations are not ready to use cloud technology due to lack of security. This paper describes the different techniques along with few security challenges, advantages and also disadvantages. It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy and consistency of data store
    corecore