Secure Cloud Storage Privacy-Preserving In Public Auditing

Authors

  • Suresh Dara Department of Computer Science & Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • K Pujitha Department of Computer Science & Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • I Santhi Department of Computer Science & Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • V Saikavya Department of Computer Science & Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author
  • K V S Rushitha Department of Computer Science & Engineering, PACE Institute of Technology and Sciences, Ongole, Andhra Pradesh, India Author

DOI:

https://doi.org/10.55524/ijircst.2023.11.3.21

Keywords:

Cloud computing, Encryption methods, Dynamic Groups Privacy, Shared Data, Revocation Data

Abstract

Cloud computing is a technology that is  both efficient and cost-effective, thanks to its low mainte nance requirements. This paper implemented a approach is  used to share group resources across cloud users. Regretta bly, as a result of the frequent differences in participation,  the issue of sharing information in a multi-owner manner  while also preserving privacy and information from a trusted  cloud continues to be a challenging one. During the course  we put into place a safe method of data sharing among mul tiple owners using the Diffe- Hellman algorithm that are  cloud-based and applicable to rotating groups. By leveraging  techniques like as group signature and dynamic broadcast  encryption, any user of the cloud has the ability to anony mously share data with other users. In the meanwhile, the  number of users whose access has been revoked does not  have any impact on the storage overhead or encryption com putation costs associated with our system. In addition, em ploy rigorous proofs to investigate the scheme's level of  safety, and conduct tests to verify the scheme's usefulness.

Downloads

Download data is not yet available.

References

Almorsy, Mohamed, John Grundy, and Ingo Müller. "An anal ysis of the cloud computing security problem." arXiv preprint arXiv:1609.01107 (2016).

Worku, Solomon Guadie, et al. "Secure and efficient privacy preserving public auditing scheme for cloud stor age." Computers & Electrical Engineering 40.5 (2014): 1703- 1713.

Tian, Hui, et al. "Privacy-preserving public auditing for secure data storage in fog-to-cloud computing." Journal of Network and Computer Applications 127 (2019): 59-69.

Wang, Cong, et al. "Privacy-preserving public auditing for data storage security in cloud computing." 2010 proceedings ieee infocom. Ieee, 2010.

Yu, Shucheng, et al. "Achieving secure, scalable, and fine grained data access control in cloud computing." 2010 Pro ceedings IEEE INFOCOM. Ieee, 2010.

Kallahalla, Mahesh, et al. "Plutus: Scalable Secure File Shar ing on Untrusted Storage." Fast. Vol. 3. 2003.

Ateniese, Giuseppe, et al. "Improved proxy re-encryption schemes with applications to secure distributed storage." ACM Transactions on Information and System Security (TISSEC) 9.1 (2006): 1-30.

Ren, Yongjun, et al. "Attributed based provable data posses sion in public cloud storage." 2014 Tenth International Con ference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2014.

Published

2023-05-30

How to Cite

Secure Cloud Storage Privacy-Preserving In Public Auditing. (2023). International Journal of Innovative Research in Computer Science & Technology, 11(3), 105–108. https://doi.org/10.55524/ijircst.2023.11.3.21