Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Multi-Cryptosystem based Privacy-Preserving Public Auditing for Regenerating Code based Cloud Storage

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Rinku Kumar, Rajit Nair
10.5120/ijca2016912442

Rinku Kumar and Rajit Nair. Multi-Cryptosystem based Privacy-Preserving Public Auditing for Regenerating Code based Cloud Storage. International Journal of Computer Applications 155(10):16-21, December 2016. BibTeX

@article{10.5120/ijca2016912442,
	author = {Rinku Kumar and Rajit Nair},
	title = {Multi-Cryptosystem based Privacy-Preserving Public Auditing for Regenerating Code based Cloud Storage},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {155},
	number = {10},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {16-21},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume155/number10/26640-2016912442},
	doi = {10.5120/ijca2016912442},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

The huge amount of data coming from different outsource in cloud storage is to be regenerated by a couple of keys and it can be regenerate code using partial keys for securing the original data privacy against the TPA (Third party Audit). It uses proxy server to maintain the file in distributed storage system. A third party auditor(TPA) and semi trusted proxy server, both are implement to the data integrity checking and code regeneration in case of failed authentication and data block. So the design of framework structure system to access the huge amount data requires more cryptographic encryption system.

The proposed work is used to design framework structure engineering with high cryptographic encryption technique. In cloud storage we require protection from different kinds of corruption, fault tolerance on data cordiality check in regenerating code based. It is very crucial matter to secure the data in cloud storage which uses working framework predominance of authorization values in four areas (User, TPA, Proxy Server and Cloud Server). The cryptography technique is used to kept secure information transforming and downloading inside specific location in cloud storage. Hence a new procedure is introduced here to checked data integrity with help of TPA (Third Party Auditor). The main purpose of auditing procedure is keep secure own data. This proposed auditing scheme makes use of either AES or DES algorithm for data block encryption. This works does not only introduce cloud related issues but also invents underlying information need to security on the cloud server.

References

  1. Jian Liu, Kun Hun, Hong Rong, H.Wang and M. Xian, “Privacy-Preserving public auditing for regenerating-code-based cloud storage”, IEEE Transaction on information forensics and security, vol. 10, no.7, JULY 2015
  2. Swapnali More, Sangita Chaudhari, “Third Party Public Auditing schemes for Storage” 7th International Conference on Computing and Virtualization 2016, Future Generation Computer Systems, Elsevier.
  3. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
  4. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
  5. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy preserving public auditing for secure cloud storage,” IEEE Trans. Compute., vol. 62, no. 2, pp. 362–375, Feb. 2013.
  6. Schoo, P., Fusenig, V., Souza, V., Melo, M., Murray, P., Debar, H., & Zeghlache, D. (2011). Challenges for cloud networking security. In Mobile Networks and Management (pp. 298-313). Springer Berlin Heidelberg.
  7. Ramgovind, S., Eloff, M. M., & Smith, E. (2010, August). The management of security in cloud computing. In Information Security for South Africa (ISSA), 2010 (pp. 1-7). IEEE.
  8. S Ezhil Arasu, B Gowri, and S Ananthi. Privacy-Preserving Public Auditing in cloud using HMAC Algorithm. International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277, 3878, 2013.
  9. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg and I. Brandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype and Reality for Delivering Computing as the 5th Utility”, Future Generation Computer Systems, Elsevier, Vol. 25, pp. 599-616, 2009.
  10. Mell, Peter, and Tim Grance. The NIST definition of cloud computing. (2011).

Keywords

Cloud Storage, TPA, Privacy Preserving, Public auditing, Proxy Server, data Integrity, Third Party Audit.