scholarly journals CS-IBE: A Data Confidentiality System in Public Cloud Storage System

2018 ◽  
Vol 141 ◽  
pp. 559-564 ◽  
Author(s):  
Ahmed Bentajer ◽  
Mustapha Hedabou ◽  
Karim Abouelmehdi ◽  
Said Elfezazi
2013 ◽  
Vol 4 (1) ◽  
pp. 106-110
Author(s):  
Rajasekaran S ◽  
Kalifulla. Y ◽  
Murugesan. S ◽  
Ezhilvendan. M ◽  
Gunasekaran. J

cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet.  Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.


PLoS ONE ◽  
2020 ◽  
Vol 15 (11) ◽  
pp. e0241236 ◽  
Author(s):  
Reem ALmarwani ◽  
Ning Zhang ◽  
James Garside

Data Integrity Auditing (DIA) is a security service for checking the integrity of data stored in a PCS (Public Cloud Storage), a third-party based storage service. A DIA service is provided by using integrity tags (hereafter referred to tags). This paper proposes a novel tagging method, called Tagging of Outsourced Data (TOD), for generating and verifying tags of files. TOD has a number of unique properties: (i) it supports both public and private verifiability, and achieves this property with a low level of overhead at the user end, making it particularly attractive to mobile users with resource-constrained devices, (ii) it protects data confidentiality, supports dynamic tags and is resilient against tag forgery and tag tampering (i.e. by authorised insiders) at the same time in more secure and efficient, making the method more suited to the PCS environment, (iii) it supports tags deduplication, making it more efficient, particularly for the user who has many files with data redundancy. Comprehensive security analysis and performance evaluation have been conducted to demonstrate the efficacy and efficiency of the approach taken in the design.


2015 ◽  
Vol 42 ◽  
pp. 60-73 ◽  
Author(s):  
Hancong Duan ◽  
Shiyao Yu ◽  
Mei Mei ◽  
Wenhan Zhan ◽  
Lin Li

2013 ◽  
Vol 10 (8) ◽  
pp. 1905-1912 ◽  
Author(s):  
P Radha Krishna Reddy ◽  
S Sivaramaiah ◽  
U Sesadri

The cloud storage system is a model consists of networked online collection of storage servers that provides long-term storage services over the Internet hosted by the third parties. Storing data in third party’s cloud system creates serious problems over data confidentiality & authorization. The normal encryption schemes may protect data confidentiality from unauthorized users, but these techniques are limited based on their functionality because only few operations are supported over encrypted data.It’s a challenging task to construct secure storage system with multiple functionalities, if the storage system is distributed. In this paper we developed a secure distributed storage system by using (UMIB-PRE) Unidirectional and Multiuse Identity based proxy re encryption technique with decentralized erasure code. The main theme of this UMIB proxy re encryption is to support encoding, storing and forwarding operations over encrypted data. Our method full supports encryption, decryption, encoding and forwarding techniques. We also suggest possible parameters for these key servers and storage servers as well. These parameters will give robustness to storage servers.


2021 ◽  
Author(s):  
Priyadharshini Kaliyamoorthy ◽  
Aroul Canessane Ramalingam

Abstract In recent years, numerous research works have been established to obtain secure data in the cloud storage system. But the data privacy regarding information outsourcing on cloud services is considered a crucial problem. In order to provide secure data, it is necessary to encrypt the information before storing it in the public cloud storage system. To provide security and data integrity during encryption and decryption, this paper proposes a global mutation-based novel artificial immune network optimization algorithm for RSA cryptosystem. Here, the Global Mutation Based Novel Artificial Immune Network Optimization (GM-NAINO) Algorithm is employed to attain optimal generation of keys thereby enhancing safe and secure data transmission and improving the data integrity during the transmission of data. Thus, the proposed GM-NAINO based RSA framework provides an effective system in improving data integrity. In addition to this, to determine the effectiveness of the proposed GM-NAINO algorithm seven benchmark functions are utilized in this paper. The performance evaluation and the comparative analysis are carried out and the proposed GM-NAINO based RSA framework outperforms other approaches.


Author(s):  
P. NagaRaju ◽  
N. Nagamalleswara Rao

Cloud computing (CC) is one amongst the developing technologies, which get more attention from academia as well as industries. It offers diverse benefits like sharing computing resources, service flexibility, reducing costs, etc. The Cloud Services Provider (CSP) is accountable for the data that are delivered to the cloud. The threat of seeing the stored data and using sensitive raw data by strangers is the main barrier in the utilization of cloud services. So, Data Security (DS) along with privacy is the chief issue, which is an obstacle while adopting the CC. Countless techniques are existent for ensuring data confidentiality, but they do not completely give protection to the data. To trounce these drawbacks, this paper introduces the Obfuscation (OB) based Modified Elliptical Curve Cryptography (MECC) algorithm for protecting data as of malicious attacks, which is termed as OB-MECC. Primarily, the proposed method obfuscates the data before they are uploaded to the cloud. For the OB of the data, the proposed work employs methods like substitution cipher (SC), position update, Ceaser cipher, binary conversion, 8-bit binary conversion, decimal(),  two complex(), and ASCII(). Then, encryption of the obfuscated data is done with the utilization of the MECC algorithm. After encryption, the data on the cloud is retrieved. The retrieved data is then decrypted by reversing the OB and encryption process to get the actual data. The outcomes corroborate that the confidentiality and security level are maximum for the proposed OB-MECC when contrasted to the existing approaches.


Sign in / Sign up

Export Citation Format

Share Document