scholarly journals Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 160459-160471 ◽  
Author(s):  
Chenbin Zhao ◽  
Li Xu ◽  
Jiguo Li ◽  
Feng Wang ◽  
He Fang
2019 ◽  
Vol 16 (1) ◽  
pp. 72-83 ◽  
Author(s):  
Yannan Li ◽  
Yong Yu ◽  
Geyong Min ◽  
Willy Susilo ◽  
Jianbing Ni ◽  
...  

Information honesty, a center security issue in solid distributed storage, has gotten a lot of consideration. Information inspecting conventions empower a verifier to productively check the trustworthiness of the re-appropriated information without downloading the information. A key exploration challenge related with existing plans of information reviewing conventions is the intricacy in key administration. In this paper, we look to address the unpredictable key administration challenge in cloud information uprightness checking by presenting fluffy personality based examining, the first in such a methodology, as far as we could possibly know. All the more explicitly, we present the crude of fluffy character based information examining, where a client's personality can be seen as a lot of spellbinding qualities. We formalize the framework model and the security model for this new crude. We at that point present a solid development of fluffy personality based inspecting convention by using biometrics as the fluffy character. The new convention offers the property of mistake resistance, in particular, it ties with private key to one personality which can be utilized to confirm the rightness of a reaction created with another character, if and just if the two characters are adequately close. We demonstrate the security of our convention dependent on the computational Diffie-Hellman suspicion and the discrete logarithm supposition in the particular ID security model. At long last, we build up a model usage of the convention which shows the common sense of the proposition.


2014 ◽  
Vol 57 (9) ◽  
pp. 1-5 ◽  
Author(s):  
Hu Xiong ◽  
YaNan Chen ◽  
GuoBin Zhu ◽  
ZhiGuang Qin

Author(s):  
Yanhua Zhang ◽  
Yong Gan ◽  
Yifeng Yin ◽  
Huiwen Jia ◽  
Yinghui Meng

2019 ◽  
Vol 8 (2S11) ◽  
pp. 3606-3611

Big data privacy has assumed importance as the cloud computing became a phenomenal success in providing a remote platform for sharing computing resources without geographical and time restrictions. However, the privacy concerns on the big data being outsourced to public cloud storage are still exist. Different anonymity or sanitization techniques came into existence for protecting big data from privacy attacks. In our prior works, we have proposed a misusability probability based metric to know the probable percentage of misusability. We additionally planned a system that suggests level of sanitization before actually applying privacy protection to big data. It was based on misusability probability. In this paper, our focus is on further evaluation of our misuse probability based sanitization of big data approach by defining an algorithm which willanalyse the trade-offs between misuse probability and level of sanitization. It throws light into the proposed framework and misusability measure besides evaluation of the framework with an empirical study. Empirical study is made in public cloud environment with Amazon EC2 (compute engine), S3 (storage service) and EMR (MapReduce framework). The experimental results revealed the dynamics of the trade-offs between them. The insights help in making well informed decisions while sanitizing big data to ensure that it is protected without losing utility required.


Sign in / Sign up

Export Citation Format

Share Document