Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,872 Hits in 6.2 sec

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min
2017 IEEE Transactions on Information Forensics and Security  
Remote data integrity checking (RDIC) enables a data storage server, such as a cloud server, to prove to a verifier that it is actually storing a data owner's data honestly.  ...  In this paper, we propose a new construction of identity-based (ID-based) RDIC protocol by making use of key-homomorphic cryptographic primitive to reduce the system complexity and the cost for establishing  ...  privacy. We provided a new construction of of this primitive and showed that it achieves soundness and perfect data privacy.  ... 
doi:10.1109/tifs.2016.2615853 fatcat:q3tq4mye7rekfmo4zlcyxkh5vi

A Secured Public Auditing Protocol with Dynamic Structure for Cloud Data

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Data sharing can be achieved with sensitive information hiding with remote data integrity auditing, propose a new concept called identity based shared data integrity auditing with sensitive information  ...  At present Cloud computing is a very successful paradigm for data computing and storage. It Increases the concerns about data security and privacy in the cloud.  ...  Yu et al. constructed a remote data integrity auditing scheme with perfect data privacy preserving in identity-based cryptosystems.  ... 
doi:10.35940/ijitee.a1019.1191s19 fatcat:lxdc7ufngbhj5hlga23wrbttzm

EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN

Prof Chethan Raj C, Shivani M S, Sowjanya D R, Sowmya M T, Tejaswini D R
2020 International Journal of Innovative Research in Computer Science & Technology  
The main aim of this paper is to discuss the usage of cloud storage services, enabling individuals to store their information in the cloud and keep away from the local data storage and maintenance expense  ...  Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud.  ...  ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental  ... 
doi:10.21276/ijircst.2020.8.4.9 fatcat:5375uqbzungm3opqzjkv7fhw5i

Enhanced Technique for Privacy Preserving Public Auditing for Shared Data in Cloud

Jyothi Kannan, Leda Kamal
2015 International Journal of Engineering Research and  
In Cloud Computing Public auditing on the integrity of shared data is extremely major problem, because the public auditing scheme will predictably reveal confidential information, and identity privacy  ...  Users can put their data remotely to cloud storage and get advantageous asset of on-demand services and application from the resources.  ...  The perfect solution is really a privacy-preserving public auditing mechanism for shared data in the cloud.  ... 
doi:10.17577/ijertv4is030384 fatcat:qsaryjzn7nbz3caoxpozztc73e

Concise Survey on Privacy Preserving Techniques in Cloud
IARJSET - Science, Engineering and Technology

B.Banu priya, V. Sobhana, Mishmala Sushith
2015 IARJSET  
Homomorphic Authenticable Ring Signature (HARS), privacy-preserving public auditing System for data storage security are discussed.  ...  LT codes based cloud storage service (LTCS) to empower efficient decoding, Merkle Hash Tree (MHT) for the block tag Authentication is discussed.  ...  This paper deals with certificate less public auditing mechanisms for confirming the data integrity in the cloud. Remote Data Checking (RDC) an avoidance Tool is discussed in detail.  ... 
doi:10.17148/iarjset.2015.2206 fatcat:hk7ocm7hu5cqfdw6bbvmsrdhtq

An Exploration on Privacy Concerned Secured Data Sharing Techniques in Cloud

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The main issues associated with cloud service handling are maintaining integrity of data, user management, secured data transmission and so on.  ...  Cloud service is the most popular environment utilized by millions of users for different kind of service utilization.  ...  performance efficiency 7 Shen et al (2018) Remote based data Proposed method is more secured Increased storage cost integrity auditing method It provides more efficient outcome More reliable cloud storage  ... 
doi:10.35940/ijitee.a4028.119119 fatcat:32ee7lesjncc7m25hm7spsy7i4

Secure Image Transaction with Reduced Space Using Encoding Technique

D. Rajagopal, K. Thilakavalli, K. Syed Ali Fathima, J. Satheesh
2015 International Journal of Communication Technology for Social Networking Services  
into the make code-based mostly cloud storage.  ...  During this paper, we tend to propose a public auditing theme for the regenerating-code [1] based cloud storage.  ...  Conclusions To protect outsourced information in cloud storage against corruptions, adding fault tolerance to cloud storage at the side of data integrity checking and failure reparation becomes essential  ... 
doi:10.21742/ijctsns.2015.3.1.01 fatcat:itd5bdt7cjf4tko2avtfv2pyn4

A Review on Secure Storage Using Bidirectional Verification Techniques in Cloud Computing

Mr. Girish kumar d, Dr. Rajashree v biradar, Dr. V c patil
2018 International Journal of Engineering & Technology  
Security has become one of the major issue in cloud computing which reduces the growth of cloud environment with complications in data privacy and data protection continue to outbreak the market.  ...  In this paper, advanced survey of the various secured storage in cloud computing using bidirectional protocols is presented.  ...  Yu et al. (2017) investigated a new primitive known as identity based remote data integrity checking for secure cloud 11 storage.  ... 
doi:10.14419/ijet.v7i4.36.24128 fatcat:xdu3ti32kra35fgd2jllxstcvy

Securing Cloud Storage by Remote Data Integrity Check with Secured Key Generation

Abdul Rehman, LIU Jian, Muhammad Qasim Yasin, LI Keqiu
2021 Chinese journal of electronics  
Identity (ID) based RDIC protocols are constructed to guarantee cloud data integrity and data privacy.  ...  In recent decades, a number of protocols for Remote data integrity checking (RDIC) have been proposed.  ...  Algorithms Our novel model for privacy preserving with untrusted PKG provide secure remote integrity checking protocol for clouds.  ... 
doi:10.1049/cje.2021.04.002 fatcat:gge6olxj4ncfthtwpceytmpbfy

Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey

Abdul Razaque, Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi
2021 Electronics  
The TPA, as a trusted party, is responsible for checking the integrity of the CC's data and all the critical information associated with it.  ...  In this paper, we present the state of the art of cloud computing's privacy-preserving models (PPM) based on a TPA.  ...  In addition, the authors would like to thank the deanship of scientific research at Shaqra University for supporting this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10212721 fatcat:c2ii7g47z5avhgh6nl64gjnjkm

Improved Cloud Auditing Protocol and Its Application for Pandemic Data Management

Xu An Wang, Zhengge Yi, Xiaoyuan Yang, Jindan Zhang, Yun Xie, Manman Zhang, Guixin Wu, Ximeng Liu
2022 Wireless Communications and Mobile Computing  
Recently, a lightweight identity-based cloud storage audit scheme has been proposed; this paper points out security vulnerabilities of their OffTagGen algorithm.  ...  Data integrity verification mechanisms play an important role in cloud environments.  ...  U1636114, 62102452, and 62172436, Open Project from Guizhou Provincial Key Laboratory of Public Big Data under grant no. 2019BDKFJJ008, Engineering University of PAP's Funding for Scientific Research Innovation  ... 
doi:10.1155/2022/5127499 fatcat:uzvc6ct2yzaihfs63awvih7bya

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

2019 KSII Transactions on Internet and Information Systems  
In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage.  ...  Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data.  ...  [6] proposed an identity-based remote data integrity checking scheme with perfect data privacy preserving for cloud storage.  ... 
doi:10.3837/tiis.2019.11.021 fatcat:2xgoptaiifftngemi4vso7e754

Cloud Computing: An Exploration on Data Integrity and Its Techniques

R. K. Ramesh ., K. L. Neela .
2019 Asian Journal of Engineering and Applied Technology  
CSP can easily modify or delete the data which are not used by the user for a long time so as to get the storage space .The data integrity problem can be overcome by some different techniques which are  ...  Each and every technology and systems can be easily integrated with cloud environment. In future lot of new technology will come to play their role.  ...  The regular language search with privacy preserving and securely proved by decisional Diffie-Hellman (DDH) assumption helps to design a data storage system with more security.  ... 
doi:10.51983/ajeat-2019.8.1.1061 fatcat:mhedkqyfujgkvesymjdnsykmja

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Jeevitha B., Thriveni J., Venugopal K.
2016 International Journal of Computer Applications  
Data Storage is main feature that cloud data centres are provided to the companies/organizations to preserve huge data.  ...  It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy  ...  Wang et al., [69] proposes ID-PUIC in public cloud and also different aspects of integrity checking like private remote data integrity checking, delegated remote data integrity checking and public remote  ... 
doi:10.5120/ijca2016912513 fatcat:y2hdci4lkrhkpfwbnykkibvhqi

Efficient Identity-based Public Integrity Auditing of Shared Data in Cloud Storage with User Privacy Preserving

Hao Yan, Wenming Gui
2021 IEEE Access  
INDEX TERMS Cloud secure storage, identity-based cryptography, group data integrity checking, user privacy preserving, efficiency and security.  ...  To overcome the shortcomings, we present a novel identity-based PDP protocol to audit efficiently the integrity of group shared data with uploader's privacy-preserving.  ...  PDP model supplies user an efficient method to remotely verify the integrity of the data in cloud storage.  ... 
doi:10.1109/access.2021.3066497 fatcat:owhyrjxczneilf6em4vbjucxcy
« Previous Showing results 1 — 15 out of 2,872 results