CFP last date
20 May 2024
Reseach Article

ECIES based Privacy Preservation for the Secure Data Storage with Auditing in Cloud

by Minakshi Solanki, Amit Saxena, Manish Manoria
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 12
Year of Publication: 2015
Authors: Minakshi Solanki, Amit Saxena, Manish Manoria
10.5120/ijca2015907606

Minakshi Solanki, Amit Saxena, Manish Manoria . ECIES based Privacy Preservation for the Secure Data Storage with Auditing in Cloud. International Journal of Computer Applications. 132, 12 ( December 2015), 1-5. DOI=10.5120/ijca2015907606

@article{ 10.5120/ijca2015907606,
author = { Minakshi Solanki, Amit Saxena, Manish Manoria },
title = { ECIES based Privacy Preservation for the Secure Data Storage with Auditing in Cloud },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 12 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number12/23643-2015907606/ },
doi = { 10.5120/ijca2015907606 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:09.612198+05:30
%A Minakshi Solanki
%A Amit Saxena
%A Manish Manoria
%T ECIES based Privacy Preservation for the Secure Data Storage with Auditing in Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 12
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a new way of transmitting or sharing data over internet such that the communication cost can be reduces. With the advancement and implementation of cloud computing enables various security issues such as un-authorized access of cloud data; hence to overcome these problems various security protocols are implemented such as Auditing Protocol for maintaining privacy during the access or storage of data at cloud [1]. But the public auditing protocol implemented for the privacy preservation increases the auditing task time and hence the performance decreases. Here in this paper a proficient procedure is implemented and proposed which is based on the concept of applying Elliptic Curve Integrated Encryption Scheme.

References
  1. Cong Wang, Sherman S.M. Chow, Qian Wang, KuiRen, and Wenjing Lou, "Privacy-Preserving Public Auditing for Secure Cloud Storage," IEEE Transactions on Computers (TC), 2011 (A preliminary version of this paper appeared at the 29th IEEE Conference on Computer Communications (INFOCOM'10)).
  2. Qian Wang, Cong Wang, KuiRen, Wenjing Lou, and Jin Li, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", To appear, IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 22, No. 5, pp. 847-859, May, 2011.
  3. Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," To appear, IEEE Transactions on Service Computing (TSC). (A preliminary version of this paper appeared at the 17th IEEE International Workshop on Quality of Service (IWQoS'09)).
  4. Cong Wang, KuiRen, Wenjing Lou, and Jin Li, "Towards Publicly Auditable Secure Cloud Data Storage Services", IEEE Network Magazine, Vol. 24, No. 4, pp. 19-24, July/August 2010.
  5. Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Privacy-preserving Public Auditing for Data Storage Security in Cloud Computing", The 29th IEEE Conference on Computer Communications (INFOCOM'10), San Diego, CA, March 15-19, 2010.
  6. Qian Wang, Cong Wang, Jin Li, KuiRen, and Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing", The 14th European Symposium on Research in Computer Security (ESORICS'09), Saint Malo, France, September 21-23, 2009.
  7. Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", The 17th IEEE International Workshop on Quality of Service (IWQoS'09), Charleston, South Carolina, July 13-15, 2009.
  8. NIST. http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
  9. Zhu,Y.,Hu,H.,Ahn,G.,Yu,M.: Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Trans. Parallel Distrib. Syst. 23(12) 2231–2244 (2012)
  10. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security (CCS’07), pp. 598–609. ACM (2007)
  11. Ateniese, G., Di Pietro, R., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on Security and privacy in communication networks (SecureComm’08), pp. 1–10. ACM (2008)
  12. Erway,C.C.,Küpçü,A., Papamanthou,C., Tamassia,R.:Dynamic provable data possession. In: Proceedings of the 16th ACM conference on computer and communications security (CCS’09), pp. 213–222. ACM (2009)
  13. Dr. P. K. Deshmukh, Mrs. V. R. Desale, Prof. R. A. Deshmukh, “Investigation of TPA (Third Party Auditor Role) foe Cloud Data Security”, International Journal of Scientific and Engineering Research, vo. 4,no. 2, ISSn 2229-5518, Feb 2013.
  14. M. Castro and B. Liskov, “Practical byzantine fault tolerance and proactive recovery,” ACM Transaction on Computer Systems, vol. 20, no. 4, pp. 398–461, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Virtualization Auditing Protocol TPA Cloud Data Storage PAAS SAAS.