Comprehensive Auditing in Clouds for Identity-Based Data Outsourcing
Keywords:
Cloud Storage, Data Outsourcing, Proof of Storage, Remote Integrity Proof, Public AuditingAbstract
Cloud storage system provides helpful file storage and sharing services for distributed shoppers. to handle integrity, manageable outsourcing and origin auditing considerations on outsourced files, we have a tendency to propose an identity-based knowledge outsourcing (IBDO) theme equipped with fascinating options advantageous over existing proposals in securing outsourced knowledge. First, our IBDO theme permits a user to authorize dedicated proxies to transfer knowledge to the cloud storage server on her behalf, e.g., an organization could authorize some staff to transfer files to the company’s cloud account in an exceedingly controlled means. The proxy’s square measure known and licensed with their recognizable identities, which eliminates difficult certificate management in usual secure distributed computing systems. Second, our IBDO theme facilitates comprehensive auditing, i.e., our theme not solely permits regular integrity auditing as in existing schemes for securing outsourced knowledge, however additionally permits to audit {the information | the knowledge | the knowledge} on data origin, sort and consistence of outsourced files. Security analysis and experimental analysis indicate that our IBDO theme provides robust security with fascinating potency.
References
- A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. Crypto’84, LNCS, vol. 196, pp. 47-53, 1984.
- D. Boneh and M. Franklin, "Identity-based encryption from the Toil pairing," Proc. Crypto’01, LNCS, vol. 2139, pp. 213-229, 2001
- R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile," IETF, RFC 3280, 2002.
- W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," Proc. Crypto’98, LNCS, vol. 1462, pp. 137-152, 1998.
- M. Naor and K. Nissim, "Certificate revocation and certificate update," IEEE Journal on Selected Areas in Communications, vol.18 , no. 4, pp. 561 - 570, 2000.
- S. Micali, "Novomodo: Scalable certificate validation and simplified PKI management," Proc. 1st Annual PKI Research Workshop, pp.15-25,2002.
- F. F. Elwailly, C. Gentry, and Z. Ramzan, "QuasiModo: Efficient certificate validation and revocation," Proc. PKC’04, LNCS, vol.2947, pp. 375-388, 2004.
- V. Goyal, "Certificate revocation using fine grained certificate space partitioning," Proc. Financial Cryptography, LNCS, vol. 4886,pp.247-259,2007.
- D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, "A Method for fast revocation of public key certificates and security capabilities," Proc.10th USENIX Security Symp., pp. 297-310. 2001.
- X. Ding and G. Tsudik, "Simple identity-based cryptography with mediated RSA," Proc. CT-RSA’03, LNCS, vol. 2612, pp. 193-210,2003
- J. Li, J. Li, X. Chen, C. Jia, and W. Lou, "Identity-based encryption with outsourced revocation in cloud computing," IEEE Trans. On Computers, vol. 64, no. 2, pp. 425-437, 2015.
- Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, and Chung-Peng Huang "Identity-Based Encryption with Cloud Revocation Authority and Its Applications" IEEE TRANS. CLOUD COMPUTING, VOL. , NO. , 2016
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.