Comprehensive Auditing in Clouds for Identity-Based Data Outsourcing

Authors

  • Prachi Girme  Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
  • Sayali Muluk  Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
  • Shamlee Tanvi Nimbalkar  Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
  • Pradnya Paigude  Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
  • Prof. Ashish Sonawane  Faculty, Department of Computer Engineering, Pune, Maharashtra, India

Keywords:

Cloud Storage, Data Outsourcing, Proof of Storage, Remote Integrity Proof, Public Auditing

Abstract

Cloud storage system provides helpful file storage and sharing services for distributed shoppers. to handle integrity, manageable outsourcing and origin auditing considerations on outsourced files, we have a tendency to propose an identity-based knowledge outsourcing (IBDO) theme equipped with fascinating options advantageous over existing proposals in securing outsourced knowledge. First, our IBDO theme permits a user to authorize dedicated proxies to transfer knowledge to the cloud storage server on her behalf, e.g., an organization could authorize some staff to transfer files to the company’s cloud account in an exceedingly controlled means. The proxy’s square measure known and licensed with their recognizable identities, which eliminates difficult certificate management in usual secure distributed computing systems. Second, our IBDO theme facilitates comprehensive auditing, i.e., our theme not solely permits regular integrity auditing as in existing schemes for securing outsourced knowledge, however additionally permits to audit {the information | the knowledge | the knowledge} on data origin, sort and consistence of outsourced files. Security analysis and experimental analysis indicate that our IBDO theme provides robust security with fascinating potency.

References

  1. A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. Crypto’84, LNCS, vol. 196, pp. 47-53, 1984.
  2. D. Boneh and M. Franklin, "Identity-based encryption from the Toil pairing," Proc. Crypto’01, LNCS, vol. 2139, pp. 213-229, 2001
  3. R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," IETF, RFC 3280, 2002.
  4. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," Proc. Crypto’98, LNCS, vol. 1462, pp. 137-152, 1998.
  5. M. Naor and K. Nissim, "Certificate revocation and certificate update," IEEE Journal on Selected Areas in Communications, vol.18 , no. 4, pp. 561 - 570, 2000.
  6. S. Micali, "Novomodo: Scalable certificate validation and simplified PKI management," Proc. 1st Annual PKI Research Workshop, pp.15-25,2002.
  7. F. F. Elwailly, C. Gentry, and Z. Ramzan, "QuasiModo: Efficient certificate validation and revocation," Proc. PKC’04, LNCS, vol.2947, pp. 375-388, 2004.
  8. V. Goyal, "Certificate revocation using fine grained certificate space partitioning," Proc. Financial Cryptography, LNCS, vol. 4886,pp.247-259,2007.
  9. D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, "A Method for fast revocation of public key certificates and security capabilities," Proc.10th USENIX Security Symp., pp. 297-310. 2001.
  10. X. Ding and G. Tsudik, "Simple identity-based cryptography with mediated RSA," Proc. CT-RSA’03, LNCS, vol. 2612, pp. 193-210,2003
  11. J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. On Computers, vol. 64, no. 2, pp. 425-437, 2015.
  12. Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, and Chung-Peng Huang "Identity-Based Encryption with Cloud Revocation Authority and Its Applications" IEEE TRANS. CLOUD COMPUTING, VOL. , NO. , 2016

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Prachi Girme, Sayali Muluk, Shamlee Tanvi Nimbalkar, Pradnya Paigude, Prof. Ashish Sonawane, " Comprehensive Auditing in Clouds for Identity-Based Data Outsourcing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.163-166 , January-February-2018.