An efficient privacy preserving cryptographic approach in cloud computing

Cloud computing belongs to distributed network technology for computing and storage capabilities purpose. It is a kind of cost-effective technology dedicated to information technology. Using the Internet, the accessibility and retrieving of cloud data have become much more accessible. The service providers can expand the storage space in a cloud environment. Security is well-thought-out to be the essential attribute in a distributed system. Cryptography can be described as a method of securing the data from attackers and eavesdroppers. Third Party Auditor is responsible for the authentication of secret files in cloud system on behalf of the data owner. The data auditability technique allows the user to make the data integrity check using a third party. Cloud computing offers unlimited data space for storage to its users and also serves sharing of data and planned use of heterogeneous resources in distributed systems. This paper describes privacy-preserving enabled public auditing method using cryptographic techniques for low-performance based end devices.

[1]  Min-Shiang Hwang,et al.  A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments , 2014, Int. J. Netw. Secur..

[2]  Zoe L. Jiang,et al.  Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.

[3]  Kalyani B. Ghutugade,et al.  Privacy preserving auditing for shared data in cloud , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).

[4]  Haifeng Li,et al.  A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption , 2017, Int. J. Netw. Secur..

[5]  Joseph K. Liu,et al.  An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.

[6]  S. L. Aarthy,et al.  Scalable and efficient attribute based encryption scheme for point to multi-point communication in cloud computing , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[7]  Jian Fang,et al.  An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme , 2015 .

[8]  U. Arjun,et al.  A short review on data security and privacy issues in cloud computing , 2016, 2016 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC).

[9]  Minglu Li,et al.  Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing , 2014, Comput. Secur..

[10]  Sonali D. Thosar,et al.  Data integrity verification privacy preserving approach of cloud using Third Party Auditor and multithreading , 2016, 2016 International Conference on Computing Communication Control and automation (ICCUBEA).

[11]  S. Jayashri,et al.  Efficient privacy preserving integrity checking model for cloud data storage security , 2017, 2016 Eighth International Conference on Advanced Computing (ICoAC).

[12]  S. S. Salokhe,et al.  Privacy and Shoulder Surfing Attack Preserving Anonymous Attribute Based Encryption Scheme , 2017 .

[13]  Rajkumar Buyya,et al.  Ensuring Security and Privacy Preservation for Cloud Data Services , 2016, ACM Comput. Surv..

[14]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[15]  Arwa Alrawais,et al.  An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.

[16]  Wei Jiang,et al.  Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.

[17]  Lei Zhang,et al.  Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.

[18]  Kunihiko Miyazaki,et al.  Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography , 2017, J. Inf. Process..

[19]  Bo-Suk Yang,et al.  Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage , 2020, IEEE Transactions on Emerging Topics in Computing.

[20]  B. Balamurugan,et al.  Privacy preserving ciphertext policy attribute based encryption scheme with efficient and constant ciphertextsize , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[21]  Fagen Li,et al.  A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment , 2017, Int. J. Netw. Secur..

[22]  Sangita Chaudhari,et al.  Third Party Public Auditing Scheme for Cloud Storage , 2016 .

[23]  Sitendra Tamrakar,et al.  An effective access from cloud data using attribute based encryption , 2015, 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE).

[24]  Weixin Xie,et al.  Attribute-Based Data Sharing Scheme Revisited in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Yanqin Zhu,et al.  Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption , 2017, 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS).

[26]  Sashank Dara Cryptography Challenges for Computational Privacyin Public Clouds , 2013, 2013 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[27]  Duncan S. Wong,et al.  A ciphertext‐policy attribute‐based proxy re‐encryption scheme for data sharing in public clouds , 2015, Concurr. Comput. Pract. Exp..

[28]  Rajkumar Buyya,et al.  An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..