Client-Side Encryption in Cloud Storage Using Lagrange Interpolation and Pairing Based Cryptography

The rapid growth in the availability and popularity of cloud services allows on demand remote storage and the computation. Security and the privacy are the main concern to establish the trust cloud service; a solution is needed to achieve confidentiality and integrity of the user data. Many modern cryptographic techniques are available to protect the user’s data in the cloud storage. In this research, we proposed an asymmetric cryptographic technique for securing the data which encrypts the original message before placing it in the cloud storage. The proposed algorithm is providing the following securities: security in transit and security at rest. Our proposed protocol equipped with the security parameters like confidentiality, authentication.

[1]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[2]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[3]  Moni Naor,et al.  The Complexity of Online Memory Checking , 2005, FOCS.

[4]  P. S. Avadhani,et al.  Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding , 2012 .

[5]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[6]  Lei Zhang,et al.  Efficient many-to-one authentication with certificateless aggregate signatures , 2010, Comput. Networks.

[7]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[8]  Peng Ning,et al.  Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings , 2009, ESORICS.

[9]  Josef Pieprzyk,et al.  Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings , 2008, ASIACRYPT.

[10]  Steve Drew,et al.  EGovernment Stage Model: Evaluating the Rate of Web Development Progress of Government Websites in Saudi Arabia , 2012, ArXiv.

[11]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[12]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[13]  Wenjing Lou,et al.  Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, INFOCOM.

[14]  R. Siva Ranjani,et al.  Current Trends in Group Key Management , 2011 .

[15]  Ronald Cramer,et al.  Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.

[16]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[17]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.