Enhanced Data Integrity Auditing And Sharing Scheme for Secure Cloud Storage

Authors

  • S. B. Autharsha  PG Scholar, Department of CSE, Ponjesly College of Engineering, Tamil Nadu, India
  • Mrs R Megiba Jasmine  Assistant Professor, Department of CSE, Ponjesly College of Engineering, Tamil Nadu, India
  • Mrs S Shiny  Assistant Professor, Department of CSE, Ponjesly College of Engineering, Tamil Nadu, India
  • Mrs S Vidhya  Assistant Professor, Department of CSE, Ponjesly College of Engineering, Tamil Nadu, India

Keywords:

Cloud computing; Data integrity auditing; Data sharing; Sensitive information hiding

Abstract

With cloud storage services, users will remotely store their data to the cloud and notice the info sharing with others. Remote information integrity auditing is planned to ensure the integrity of the info hold on within the cloud. In some common cloud storage systems adore the Electronic Health Records (EHRs) system, the cloud file may contain some sensitive information. The sensitive data mustn't be exposed to others once the cloud file is shared. Encrypting the total shared file will realize the sensitive data hiding, however can create this shared file unable to be utilized by others. the way to notice information sharing with sensitive data concealing in remote information integrity auditing still has not been explored up to now. so as to deal with this problem, we tend to propose a distant information integrity auditing theme that realizes information sharing with sensitive data concealing in this paper. during this scheme, a sanitizer is employed to sanitize the data blocks comparable to the sensitive data of the file and transforms these information blocks’ signatures into valid ones for the sanitised file. These signatures are accustomed verify the integrity of the sanitised get in the part of integrity auditing. As a result, our theme makes the file hold on within the cloud able to be shared and utilized by others on the condition that the sensitive information is hidden, whereas the remote information integrity auditing is still able to be expeditiously executed. Meanwhile, the planned scheme is predicated on identity-based cryptography, that simplifies the sophisticated certificate management. the safety analysis and the performance analysis show that the planned theme is secure and economical

References

  1. K. Ren, C. Wang, and Q. Wang, “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, Jan 2012.
  2. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.
  3. G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, and R. Hao, “Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability,” J. Syst. Softw., vol. 113, no. C, pp. 130–139, Mar. 2016.
  4. B. Wang, B. Li, and H. Li, “Oruta: Privacy- preserving public auditing for shared data in the cloud,” in 2012 IEEE Fifth International Conference on Cloud Computing, June 2012, pp. 295–302.
  5. Y. Yu, M. H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, and G. Min, “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 4, pp. 767–778, April 2017.
  6. J. Yu, K. Ren, C. Wang, and V. Varadharajan, “Enabling cloud storage auditing with key-exposure resistance,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1167–1179, 2015.
  7. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847–859, May 2011.
  8. J. Sun and Y. Fang, “Cross-domain data sharing in distributed electronic health record systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 6, pp. 754–764, June 2010.
  9. J. Yu and H. Wang, “Strong key-exposure resilient auditing for secure cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 8, pp. 1931–1940, Aug 2017.
  10. C. Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, “Symmetric-key based proofs of retrievability supporting public verification,” in Computer Security– ESORICS 2015. Cham: Springer International Publishing, 2015, pp. 203–223.
  11. Vinu Sundararaj, Selvi uthukumar, & Kumar,R.S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol
  12. Vilaplana, J., Solsona, F., Teixido, I., & ritus,J. (2014). A queuing theory model for cloud computing. Journal pf Supercomputing, 69(1), 492-507.
  13. Xie, J., Dan, L., Yin, L., & Sun,Z . (2015). An energy optimal scedulimg for cllabrative execution in mobile computing. In 2015 international conference and workshop on cloud computing and communication(pp.1-6). IEEE.
  14. Zhang, W., Wen, Y., & Wu, D.(2013). Energy- efficient scheduling policy for collaborative execution in mobile cloud computing. Iin 2013 Proceedings IEEE(pp. 190-194).
  15. Tayal, S. (2011). Tasks scheduling optimization for the cloud computing systems. IJAEST-International Journal of advanced Engineering Sciences and Technologies, 1(5), 111-115.
  16. Xu, B., Peng, Z., Xiao, F., & Yu, P(2015). Dynamic deploymaent of virtual machines in cloud computing using multi-objective optimization. Soft computing, 19(8), 2265-2273.
  17. Altamimi, M., Abdrabou, A., Naik, K., & Nayak, A. (2015). Energy cost models of smartphones for task. IEEE Transactions Emerging topics in Computing, 3(3), 384-398.
  18. Y. Zhang, J. Yu, R. Hao, C. Wang, and K. Ren, “Enabling efficient user revocation in identity-based cloud storage auditing for shared big data,” IEEE Transactions on Dependable and Secure Computing,2019 .
  19. A. Fu, S. Yu, Y. Zhang, H. Wang, and C. Huang, “Npp: A new privacy-aware public auditing scheme for cloud data sharing with group users,” IEEE Transactions on Big Data, 2017.
  20. Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, and K.K. R. Choo, “Fuzzy identity-based data integrity auditing for reliable cloud storage systems,” IEEE Transactions on Dependable and Secure Computing, 2017.

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
S. B. Autharsha, Mrs R Megiba Jasmine, Mrs S Shiny, Mrs S Vidhya, " Enhanced Data Integrity Auditing And Sharing Scheme for Secure Cloud Storage, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.294-304, March-April-2021.