Comprehensive Auditing in Clouds for Identity-Based Data Outsourcing

Authors(5) :-Prachi Girme, Sayali Muluk, Shamlee Tanvi Nimbalkar, Pradnya Paigude, Prof. Ashish Sonawane

Cloud storage system provides helpful file storage and sharing services for distributed shoppers. to handle integrity, manageable outsourcing and origin auditing considerations on outsourced files, we have a tendency to propose an identity-based knowledge outsourcing (IBDO) theme equipped with fascinating options advantageous over existing proposals in securing outsourced knowledge. First, our IBDO theme permits a user to authorize dedicated proxies to transfer knowledge to the cloud storage server on her behalf, e.g., an organization could authorize some staff to transfer files to the company’s cloud account in an exceedingly controlled means. The proxy’s square measure known and licensed with their recognizable identities, which eliminates difficult certificate management in usual secure distributed computing systems. Second, our IBDO theme facilitates comprehensive auditing, i.e., our theme not solely permits regular integrity auditing as in existing schemes for securing outsourced knowledge, however additionally permits to audit {the information | the knowledge | the knowledge} on data origin, sort and consistence of outsourced files. Security analysis and experimental analysis indicate that our IBDO theme provides robust security with fascinating potency.

Authors and Affiliations

Prachi Girme
Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
Sayali Muluk
Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
Shamlee Tanvi Nimbalkar
Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
Pradnya Paigude
Research Scholar, Department of Computer Engineering, Pune, Maharashtra, India
Prof. Ashish Sonawane
Faculty, Department of Computer Engineering, Pune, Maharashtra, India

Cloud Storage, Data Outsourcing, Proof of Storage, Remote Integrity Proof, Public Auditing

  1. A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. Crypto’84, LNCS, vol. 196, pp. 47-53, 1984.
  2. D. Boneh and M. Franklin, "Identity-based encryption from the Toil pairing," Proc. Crypto’01, LNCS, vol. 2139, pp. 213-229, 2001
  3. R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," IETF, RFC 3280, 2002.
  4. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," Proc. Crypto’98, LNCS, vol. 1462, pp. 137-152, 1998.
  5. M. Naor and K. Nissim, "Certificate revocation and certificate update," IEEE Journal on Selected Areas in Communications, vol.18 , no. 4, pp. 561 - 570, 2000.
  6. S. Micali, "Novomodo: Scalable certificate validation and simplified PKI management," Proc. 1st Annual PKI Research Workshop, pp.15-25,2002.
  7. F. F. Elwailly, C. Gentry, and Z. Ramzan, "QuasiModo: Efficient certificate validation and revocation," Proc. PKC’04, LNCS, vol.2947, pp. 375-388, 2004.
  8. V. Goyal, "Certificate revocation using fine grained certificate space partitioning," Proc. Financial Cryptography, LNCS, vol. 4886,pp.247-259,2007.
  9. D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, "A Method for fast revocation of public key certificates and security capabilities," Proc.10th USENIX Security Symp., pp. 297-310. 2001.
  10. X. Ding and G. Tsudik, "Simple identity-based cryptography with mediated RSA," Proc. CT-RSA’03, LNCS, vol. 2612, pp. 193-210,2003
  11. J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. On Computers, vol. 64, no. 2, pp. 425-437, 2015.
  12. Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, and Chung-Peng Huang "Identity-Based Encryption with Cloud Revocation Authority and Its Applications" IEEE TRANS. CLOUD COMPUTING, VOL. , NO. , 2016

Publication Details

Published in : Volume 4 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 163-166
Manuscript Number : IJSRSET1184141
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Prachi Girme, Sayali Muluk, Shamlee Tanvi Nimbalkar, Pradnya Paigude, Prof. Ashish Sonawane, " Comprehensive Auditing in Clouds for Identity-Based Data Outsourcing, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.163-166 , January-February.2018
URL : http://ijsrset.com/IJSRSET1184141

Follow Us

Contact Us