Secure Cloud Storage Privacy-Preserving In Public Auditing
DOI:
https://doi.org/10.55524/ijircst.2023.11.3.21Keywords:
Cloud computing, Encryption methods, Dynamic Groups Privacy, Shared Data, Revocation DataAbstract
Cloud computing is a technology that is both efficient and cost-effective, thanks to its low mainte nance requirements. This paper implemented a approach is used to share group resources across cloud users. Regretta bly, as a result of the frequent differences in participation, the issue of sharing information in a multi-owner manner while also preserving privacy and information from a trusted cloud continues to be a challenging one. During the course we put into place a safe method of data sharing among mul tiple owners using the Diffe- Hellman algorithm that are cloud-based and applicable to rotating groups. By leveraging techniques like as group signature and dynamic broadcast encryption, any user of the cloud has the ability to anony mously share data with other users. In the meanwhile, the number of users whose access has been revoked does not have any impact on the storage overhead or encryption com putation costs associated with our system. In addition, em ploy rigorous proofs to investigate the scheme's level of safety, and conduct tests to verify the scheme's usefulness.
Downloads
References
Almorsy, Mohamed, John Grundy, and Ingo Müller. "An anal ysis of the cloud computing security problem." arXiv preprint arXiv:1609.01107 (2016).
Worku, Solomon Guadie, et al. "Secure and efficient privacy preserving public auditing scheme for cloud stor age." Computers & Electrical Engineering 40.5 (2014): 1703- 1713.
Tian, Hui, et al. "Privacy-preserving public auditing for secure data storage in fog-to-cloud computing." Journal of Network and Computer Applications 127 (2019): 59-69.
Wang, Cong, et al. "Privacy-preserving public auditing for data storage security in cloud computing." 2010 proceedings ieee infocom. Ieee, 2010.
Yu, Shucheng, et al. "Achieving secure, scalable, and fine grained data access control in cloud computing." 2010 Pro ceedings IEEE INFOCOM. Ieee, 2010.
Kallahalla, Mahesh, et al. "Plutus: Scalable Secure File Shar ing on Untrusted Storage." Fast. Vol. 3. 2003.
Ateniese, Giuseppe, et al. "Improved proxy re-encryption schemes with applications to secure distributed storage." ACM Transactions on Information and System Security (TISSEC) 9.1 (2006): 1-30.
Ren, Yongjun, et al. "Attributed based provable data posses sion in public cloud storage." 2014 Tenth International Con ference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2014.