Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Security into Cloud Storage with Adding Integrity and Timed Ephemerizer

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 7
Year of Publication: 2014
Authors:
Surbhi Sahu
Amandeep Saini
Sarvesh Kumar
Sonali Rathod
10.5120/16809-6540

Surbhi Sahu, Amandeep Saini, Sarvesh Kumar and Sonali Rathod. Article: Security into Cloud Storage with Adding Integrity and Timed Ephemerizer. International Journal of Computer Applications 96(7):41-43, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Surbhi Sahu and Amandeep Saini and Sarvesh Kumar and Sonali Rathod},
	title = {Article: Security into Cloud Storage with Adding Integrity and Timed Ephemerizer},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {7},
	pages = {41-43},
	month = {June},
	note = {Full text available}
}

Abstract

Today cloud computing technology is very popular . there are several reason for using cloud computing. Cloud computing used for internet based computing solution. There are many computer work together into cloud computing. With the help if cloud computing, the individual can now run the application from anywhere. Cloud user does not purchase any software or buy software licence. User can take other benefits including scalability, reliability and efficiency. Ephemerizer is concept for developing security into cloud storage at any storage device. It is ensure that data completely destroyed. If any sensitive data not deleted so it will be create difficulty. This paper is concern about security of sensitive data into cloud storage. Data into cloud storage is absolute deletion become difficult because if we deleted data, it copies may be remain on backup media. We show that ephemerizer protocol work with finite amount of time with integrity property. Data into cloud storage is absolute deletion become difficult because if we deleted data, it copies may be remain on backup media. We show that ephemerizer protocol work with finite amount of time with integrity property.

References

  • M. Bellare and A. Palacio. The knowledge-of-exponent assumptions and 3-round Zero-knowledge protocols. In M. K. Franklin, editor, Advances in Cryptology —CRYPTO 2004, volume 3152 of LNCS, pages 273–289. Springer, 2004.
  • D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In J. Kilian, editor,Advances in Cryptology—CRYPTO2001, volume 2139 of LNCS, pages 213–229. Springer, 2001.
  • J. Cathalo, B. Libert, and J. -J. Quisquater. Efficient and non-interactive timed-release Encryption. In S. Qing, W. Mao, J. Lopez, and G. Wang, editors, Proceedings of the 7th International Conference on Information and Communications Security, volume 3783 of LNCS, pages 291–303. Springer-Verlag, 2005.
  • Ivan Damgård. Towards practical public key systems secure against chosen ciphertext attacks. In J. Feigenbaum, editor, Advances in Cryptology — CRYPTO 1991, volume 576 of LNCS, pages 445–456. Springer, 1991.
  • A. W. Dent and Q. Tang. Revisiting the security model for timed-release encryption with pre-open capability. In J. A. Garay, A. K. Lenstra, M. Mambo, and R. Peralta, editors, Information Security, 10th International Conference, ISC 2007, volume 4779 of LNCS, pages 158–174. Springer, 2007.
  • J. A. Halderman, S. D. Schoen, N. Heninger,W. Clarkson,W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest We Remember: Cold Boot Attacks on Encryption Keys. In P. C. van Oorschot, editor, Proceedings of the 17th USENIX Security Symposium, pages 45–60. USENIX Association, 2008.
  • . Y. Hwang, D. Yum, and P. Lee. Timed-release encryption with pre-open capability and its application to certified e-mail system. In J. Zhou, J. Lopez, R. Deng, and F. Bao, editors, Proceedings of the 8th International Information Security Conference (ISC 2005), volume 3650 of LNCS, pages 344–358. Springer, 2005.
  • Charu Arora. The ephemerizer's models and analysis tools. "http://www. loria. fr/_turuani/Ephemerizer models. zip".
  • Y. Boichut, P. -C. H´eam, and 0. Kouchnarenko. Automatic verification of security protocols using approximations. Research report, INRIA, 2005.
  • Danny Dolev and Andrew Chi-Chih Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198–207, 1983.
  • Catherine Meadows. Open issues in formal methods for cryptographic protocol analysis. In MMM-ACNS, page 21, 2001.
  • Radia Perlman. The ephemerizer: Making data disappear. Technical report, Sun Labs, 16 Network Circle, Menlo Park, CA 94025, USA, 2005.
  • The AVISPA team. The avispa tool for the automated validation of internet security protocols and applications. In CAV, pages 281–285, 2005.
  • Mathieu Turuani. The cl-atse protocol analyser. In RTA, 2006. to be published.
  • Q. Tang. Timed-ephemerizer: Make assured data appear and disappear. Technical report, Centre for Telematics and Information Technology, University of Twente, 2009. http://eprints. eemcs. utwente. nl/15802/.