scispace - formally typeset
Open AccessJournal ArticleDOI

Secure open cloud in data transmission using reference pattern and identity with enhanced remote privacy checking

Ran Vijay Singh, +1 more
- Vol. 263, Iss: 4, pp 042006
Reads0
Chats0
TLDR
A model is proposed which is based on an identity based cryptography in data transmission and intermediate entity which have client's reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side.
Abstract
To handle the large amount of client's data in open cloud lots of security issues need to be address. Client's privacy should not be known to other group members without data owner's valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client's reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner's authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie–Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.

read more

References
More filters
Proceedings ArticleDOI

Scalable and efficient provable data possession

TL;DR: In this article, a provably secure storage outsourced data possession (PDP) technique based on symmetric key cryptography was proposed, which allows outsourcing of dynamic data, such as block modification, deletion and append.
Journal ArticleDOI

Mutual Verifiable Provable Data Auditing in Public Cloud Storage

TL;DR: This paper proposes an efficient mutual verifiable provable data possession scheme, which utilizes Diffie-Hellman shared key to construct the homomorphic authenticator and is very efficient compared with the previous PDP schemes, since the bilinear operation is not required.
Journal ArticleDOI

Proxy Provable Data Possession in Public Clouds

TL;DR: This paper designs an efficient PPDP protocol based on the bilinear pairing technique that is provable secure and efficient in public clouds when the client cannot perform the remote data possession checking.
Proceedings ArticleDOI

Identity-Based Cryptography Techniques and Applications (A Review)

TL;DR: This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field.
Proceedings ArticleDOI

Data anonymization and integrity checking in cloud computing

TL;DR: A better efficient data anonymization scheme is proposed where anonymization and deanonymization is performed by the secure enclave so that computational power at the client is saved and a scheme to check the integrity of anonymized data in cloud has been explored.
Related Papers (5)