Secure open cloud in data transmission using reference pattern and identity with enhanced remote privacy checking
Ran Vijay Singh,L. Agilandeeswari +1 more
- Vol. 263, Iss: 4, pp 042006
Reads0
Chats0
TLDR
A model is proposed which is based on an identity based cryptography in data transmission and intermediate entity which have client's reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side.Abstract:
To handle the large amount of client's data in open cloud lots of security issues need to be address. Client's privacy should not be known to other group members without data owner's valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client's reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner's authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie–Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.read more
References
More filters
Proceedings ArticleDOI
Scalable and efficient provable data possession
TL;DR: In this article, a provably secure storage outsourced data possession (PDP) technique based on symmetric key cryptography was proposed, which allows outsourcing of dynamic data, such as block modification, deletion and append.
Journal ArticleDOI
Mutual Verifiable Provable Data Auditing in Public Cloud Storage
TL;DR: This paper proposes an efficient mutual verifiable provable data possession scheme, which utilizes Diffie-Hellman shared key to construct the homomorphic authenticator and is very efficient compared with the previous PDP schemes, since the bilinear operation is not required.
Journal ArticleDOI
Proxy Provable Data Possession in Public Clouds
TL;DR: This paper designs an efficient PPDP protocol based on the bilinear pairing technique that is provable secure and efficient in public clouds when the client cannot perform the remote data possession checking.
Proceedings ArticleDOI
Identity-Based Cryptography Techniques and Applications (A Review)
TL;DR: This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field.
Proceedings ArticleDOI
Data anonymization and integrity checking in cloud computing
Reenu Sara George,S. Sabitha +1 more
TL;DR: A better efficient data anonymization scheme is proposed where anonymization and deanonymization is performed by the secure enclave so that computational power at the client is saved and a scheme to check the integrity of anonymized data in cloud has been explored.