CFP last date
20 May 2024
Reseach Article

Privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud

by Reshu Tomar, Rajkumar Singh Rathore
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 8
Year of Publication: 2016
Authors: Reshu Tomar, Rajkumar Singh Rathore
10.5120/ijca2016909011

Reshu Tomar, Rajkumar Singh Rathore . Privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud. International Journal of Computer Applications. 138, 8 ( March 2016), 33-36. DOI=10.5120/ijca2016909011

@article{ 10.5120/ijca2016909011,
author = { Reshu Tomar, Rajkumar Singh Rathore },
title = { Privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 8 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number8/24401-2016909011/ },
doi = { 10.5120/ijca2016909011 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:10.580735+05:30
%A Reshu Tomar
%A Rajkumar Singh Rathore
%T Privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 8
%P 33-36
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a model for enabling everywhere, well-located, on-demand network access to a shared pool of compo sable computing resources (e.g., servers, networks, applications, and services). Mainly users can digress the support and maintenance of IT services to cloud service providers which is expert in providing knowledge and also maintains the vast amount of IT resources. Just like a double-bladed sword, cloud computing also brings in many new security challenges to ensure the protection of confidentiality and to preserve the integrity of users data in the cloud. To resolve these problems, this work uses the technique of secret key based symmetric key cryptography which enables TPA to perform the auditing task without demanding the local copy of user’s stored data and thus severely reduces the computation and transmission overhead as compare to simple, straightforward data auditing approaches. Thereby integrating the encryption with hashing, this work guarantees that the TPA could not learn any knowledge about the data content that is store in the cloud server during the auditing process.

References
  1. Farzad Sabahi,“Cloud Computing Security Threats and Responses” ,IEEE confer. 2011, 978-1-61284-486-2/111
  2. Boyang Wang,”Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud” IEEE Transactions on Cloud Computing, Vol. 2, no. 1, Jan-March 2014.
  3. K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol. 16, no.1 pp. 69-73, 2012.
  4. D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protection for the Masses,” Computer, vol. 45, no. 1, pp. 39-45, 2012.
  5. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, pp. 525-533, 2010.
  6. B. Wang, M. Li, S.S. Chow, and H. Li, “Computing Encrypted Cloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf.Comm. and Network Security (CNS’13), pp. 90-99, 2013.
  7. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm.Security (CCS ’07), pp. 598-610, 2007.
  8. H. Shacham and B. Waters, “Compact Proofs of Retrievability,”Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.
  9. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computer and Comm. Security (CCS’09), pp. 213-222, 2009.
  10. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamic for Storage Security in Cloud Computing,” Proc. 14th European Conf. Research in Computer Security(ESORICS’09), pp. 355-370, 2009.
  11. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS’09), pp. 1-9, 2009.
  12. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote Data Checking for Network Coding-Based Distributed Storage Systems,” Proc. ACM Workshop Cloud Computing Security Workshop(CCSW’10), pp. 31-42, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Cloud TPA Cryptography