Research Article | OPEN ACCESS
An Efficient RSA Based Data Integrity Schema in Secured Cloud Storage
S. Hemalatha and Dr. R. Manickachezian
Department of Computer Science, N.G.M. College, Pollachi, Coimbatore, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 2014 20:2103-2109
Received: June 17, 2014 | Accepted: July 13, 2014 | Published: November 25, 2014
Abstract
This study aim is to address the problem of outsourcing data. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility over a network. The imperative feature of cloud services is that the user data are frequently processed remotely in unidentified machines that users do not own or operate. Due to this reason, the data owner loss their original data and it becomes an important obstruction to the extensive implementation of cloud services. This study introduces the term data accountability based encryption and users can substitute to a Third-Party Auditor (TPA) for the verification of data integrity problem. This study proposes the security of the outsourced data in cloud by generating keys for each cloud user attribute with Attribute Based Encryption (ABE) using Efficient RSA (Rivest, Shamir, Adleman) schema and Ring Based Fully Homomorphic Encryption (RBFHE) schema for uploading user data.
Keywords:
Cloud computing, data accountability, data integrity, data storage, public auditability,
References
-
Aboud, S.J., M.A. Alfayoumi, M. Alfayoumi and H. Jabbar, 2008. An efficient RSA public key encryption scheme. Proceeding of the 5th International Conference on Information Technology: New Generations (ITNG), Las Vegas, pp: 127-130.
CrossRef -
Amazon.com, 2008. Amazon s3.Retrieved from: http://status.aws.amazon.com/s3-20080720. html (Accessed on: July 20, 2008).
-
Arrington, M., 2006. Gmail Disaster: Reports of Mass Email Deletions. Retrieved from: http://www.techcrunch.com/2006/12/28/gmail-disasterreports of-mass-email-deletions/.
-
Ateniese, G., R.D. Pietro, L.V. Mancini and G. Tsudik, 2008. Scalable and efficient provable data possession. Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm'08), pp: 1-10.
CrossRef -
Calheiros, R.N., R. Ranjan, C.A.F.D. Rose and R. Buyya, 2009. CloudSim: A novel framework for modeling and simulation of cloud computing infrastructures and services. Technical Report, GRIDS-TR-2009-1, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia.
-
Calheiros, R.N., R. Ranjan, A. Beloglazov, C.A.F. De Rose and R. Buyya, 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software Pract. Exper., 2011: 23-50.
CrossRef -
Chun, B. and A.C. Bavier, 2004. Decentralized trust management and accountability in federated system. Proceeding of the Annial Hawaii International Conference on System Science (HICSS).
CrossRef -
Cloud Security Alliance, 2010. Top Threats to Cloud Computing. Retrieved from: http://www. Cloud securityalliance.org.
-
Crispo, B. and G. Ruffo, 2001. Reasoning about accountability within delegation. Proceeding of the 3rd International Conference on Information and Communication Security (ICICS), pp: 251-260.
CrossRef -
Erway, C., A. Kupcu, C. Papamanthou and R. Tamassia, 2009. Dynamic provable data possession. Proceeding of the ACM Conference on Computer and Communication Security (CCS'09), pp: 213-222.
CrossRef -
Hemalatha, S. and R. Manickachezian, 2012. Present and future of cloud computing: A collaborated survey report. Int. J. Innov. Technol. Exploring Eng., 1(2).
-
Hemalatha, S. and R. Manickachezian, 2013. Implicit security architecture framework in cloud computing based on data partitioning and security key distribution. Int. J. Emerg. Technol. Comput. Appl. Sci., 2013: 76-81.
-
Kincaid, J., 2008. MediaMax/TheLinkup Closes Its Doors. Retrieved from: http://www.techcrunch. com/2008/07/10/media maxthelinkup-closesits-doors/.
-
Lee, W., A. Cinzia Squicciarini and E. Bertino, 2009. The design and evaluation of accountable grid computing system. Proceeding of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS'09), pp: 145-154.
CrossRef -
Pearson, S., 2009. Taking account of privacy when designing cloud computing services. Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (CLOUD '09), pp: 44-52.
CrossRef -
Pearson, S., Y. Shen and M. Mowbray, 2009a. A privacy manager for cloud computing. Proceedings of the International Conference on Cloud Computing (cloudcom), pp: 90-106.
CrossRef -
Pearson, S., A.C. Squicciarini and D. Lin, 2009b. Accountability as a way forward for privacy protection in the cloud. Proceeding of the 1st International Conference on Cloud Computing.
CrossRef -
Sundareswaran, S. and A.C. Squicciarini, 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE T. Depend. Secure, 9(4): 556-568.
CrossRef -
Wang, C., Q. Wang, K. Ren and W. Lou, 2010a. Privacy-preserving public auditing for data storage security in cloud computing. Proceeding of the IEEEINFOCOM, San Diego, CA, pp: 525-533.
CrossRef -
Wang, Q., C. Wang, K. Ren, W. Lou and J. Li, 2010b. Enabling public auditability and data dynamics for storages security in cloud computing. Proceeding of the IEEEINFOCOM, pp: 525-533.
-
Wang, C., Q. Wang, K. Ren and W. Lou, 2012. Towards secure and dependable storage services in cloud computing. IEEE T. Serv. Comput., 5(2): 220-232.
CrossRef
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|