Study on Encryption Techniques Used to Secure Cloud Storage System

Authors

  • Athulya V S  M. Tech Scholar, M Tech Scholar, Department of Computer Science and Engineering, GEC Idukki, Kerala, India
  • Dileesh E D   Assistant Professor, Department of Computer Science and Engineering, GEC Idukki, Kerala, India

DOI:

https://doi.org//10.32628/IJSRSET207140

Keywords:

Encryption, Cloud, Cloud Storage

Abstract

Cloud storage is used generally to store data and realize the data sharing with others. A cloud storage system stores large number of data in its storage server. Data that are stored to the cloud have to be secured in order to avoid the data from exploiting. There are several techniques and methods that are used to secure the data before uploading it to the cloud such as cryptographic encryption techniques. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.

References

  1. ManishKo the,Harshal Karandikar, NikhilWani, SumitTamkhane "Attribute-BasedEncryptionwithVerifiableOutsourced
  2. Decryption" 2016,International Research Journal of Engineering and Technology.
  3. Liang Liu and Jun Ye "HoneyGen: "A Homomorphic Universal Re-encryptor for Identity-based Encryption", 2016,International Journal of Network Security.
  4. Cong Wang, Sherman S.-M. Chow, Qian Wang,Kui Ren and Wenjing Lou"Privacy-Preserving Public Auditing for Secure Cloud Storage" 2013,IEEE Transactions on Computers.
  5. Mohammad Ubaidullah Bokhari and Qahtan Makki Shallal "Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computation " 2017,International Journal of Computer Applications.
  6. Avinash Shukla, Sanjay Silakari and Uday Chourasia "A Secure Data Storage over Cloud using ABE Approach " 2017,International Journal of Computer Applications.
  7. Swati V.Thakre, Prof. K.K.Chhajed and Prof.V.B.Bhagat "Key Based Encryption Scheme for Secure Data Sharing on Cloud' ,International Research Journal of Engineering and Technology.
  8. Caihui Lan , Haifeng Li , Shoulin Yin, and Lin Teng. "A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption". 2016, International Journal of Network Security.
  9. Abiodun Esther Omolara "Security and Verification of Data inMulti-Cloud Storage with Provable Data Possession " 2015,International Journal of Computer Applications.
  10. Wenting Shen, Jing Qin, Jia Yu, Rong Hao, and Jiankun Hu, Senior Member "Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage" IEEE Transaction 2018.
  11. C. Erway, C. Papamanthou, and R. Tamassia, "Dynamic provable data possession," in ACM Conference on Computer and Communications Security, 2009, pp. 213–222.
  12. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE Transactions on Parallel and Distributed Systems, vol. 22.
  13. J. Yu, K. Ren, C. Wang, and V. Varadharajan, "Enablingcloud storage auditing with key-exposure resistance," IEEE Transactions on Information Forensics and Security, vol. 10, no. 6, pp. 1167–1179, 2015.
  14. J. Yu, K. Ren, and C. Wang, "Enabling cloud storage auditing with verifiable outsourcing of key updates," IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1362–1375, June 2016.
  15. J. Yu and H. Wang, "Strong key-exposure resilient auditing for secure cloud storage," IEEE Transactions on Information Forensics and Security, vol. 12, no. 8, pp. 1931–1940, Aug 2017.
  16. J. Yu, R. Hao, H. Xia, H. Zhang, X. Cheng, and F. Kong, "Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction," Information Sciences, vol. 442-443, pp. 158 – 172, 2018.
  17. B. Wang, B. Li, and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud," in 2012 IEEE Fifth International Conference on Cloud Computing, June 2012, pp. 295–302.
  18. G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, and R. Hao, "Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability," J. Syst. Softw., vol. 113, no. C, pp. 130–139, Mar. 2016.
  19. A. Fu, S. Yu, Y. Zhang, H. Wang, and C. Huang, "Npp: A new privacy-aware public auditing scheme for cloud data sharing with group users," IEEE Transactions on Big Data, 2017. [Online]. Available: DOI:10.1109/TBDATA.2017.2701347
  20. B. Wang, B. Li, and H. Li, "Panda: Public auditing for shared datawith efficient user revocation in the cloud," IEEE Transactions on Services Computing, vol. 8, no. 1, pp. 92–106, Jan.-Feb. 2015.
  21. Y. Luo, M. Xu, S. Fu, D. Wang, and J. Deng, "Efficient integrity auditing for shared data in the cloud with secure user revocation," in Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01, ser. TRUSTCOM '15, 2015, pp. 434–442.
  22. H. Wang, "Identity-based distributed provable data possession in multicloud storage," IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328–340, 2015.
  23. H. Wang, D. He, and S. Tang, "Identity-based proxyoriented data uploading and remote data integrity checking in public cloud," IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1165–1176, June 2016.
  24. Y. Yu, M. H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, and G. Min, "Identity-based remote data integrity checking with perfect data privacy preserving for cloud

Downloads

Published

2020-02-29

Issue

Section

Research Articles

How to Cite

[1]
Athulya V S, Dileesh E D , " Study on Encryption Techniques Used to Secure Cloud Storage System, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 7, Issue 1, pp.238-244, January-February-2020. Available at doi : https://doi.org/10.32628/IJSRSET207140