Non-deterministic Paillier Endorsement Asymmetric Key Cryptosystem-Based Whirlpool Hashing Quotient Filter for Secured Data Access on Cloud Storage

Author(s):  
P. Jayasree ◽  
V. Saravanan
2016 ◽  
Vol 96 (4) ◽  
pp. 5295-5314 ◽  
Author(s):  
Xiong Li ◽  
Saru Kumari ◽  
Jian Shen ◽  
Fan Wu ◽  
Caisen Chen ◽  
...  

Author(s):  
Navya Gouru ◽  
NagaLakshmi Vadlamani

The redesign of cloud storage with the amalgamation of cooperative cloud and an immutable and unhackable distributed database blockchain thrives towards a strong CIA triad and secured data provenance. The conspiracy ideology associated with the traditional cloud has economized with cooperative cloud storage like Storj and Sia, decentralized storage, which allows renting the unused hard drive space and getting monetary compensation in an exchange with cryptocurrency. In this article, the authors explain how confidentiality, integrity and availability can be progressed with cooperative cloud storage along with tamper-proof data provenance management with ethereum smart contracts using zero-knowledge proof (ZKP). A contemporary architecture is proposed with regards to storing data on the cooperative cloud and collecting and verifying the provenance data from the cloud and publishing the provenance data into blockchain network as transactions.


2011 ◽  
Vol 8 (3) ◽  
pp. 801-819 ◽  
Author(s):  
Huang Ruwei ◽  
Gui Xiaolin ◽  
Yu Si ◽  
Zhuang Wei

In order to implement privacy-preserving, efficient and secure data storage and access environment of cloud storage, the following problems must be considered: data index structure, generation and management of keys, data retrieval, treatments of change of users? access right and dynamic operations on data, and interactions among participants. To solve those problems, the interactive protocol among participants is introduced, an extirpation-based key derivation algorithm (EKDA) is designed to manage the keys, a double hashed and weighted Bloom Filter (DWBF) is proposed to retrieve the encrypted keywords, which are combined with lazy revocation, multi-tree structure, asymmetric and symmetric encryptions, which form a privacypreserving, efficient and secure framework for cloud storage. The experiment and security analysis show that EKDA can reduce the communication and storage overheads efficiently, DWBF supports ciphertext retrieval and can reduce communication, storage and computation overhead as well, and the proposed framework is privacy preserving while supporting data access efficiently.


Author(s):  
Jianting Ning ◽  
Zhenfu Cao ◽  
Xiaolei Dong ◽  
Kaitai Liang ◽  
Lifei Wei ◽  
...  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 47144-47160 ◽  
Author(s):  
Zahid Ghaffar ◽  
Shafiq Ahmed ◽  
Khalid Mahmood ◽  
Sk Hafizul Islam ◽  
Mohammad Mehedi Hassan ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document