Enhancing Secure and Reliable Data Transfer through Robust Integrity

Main Article Content

P Raja Sekhar Reddy , K Ravindranath

Abstract

Cloud computing has emerged as a highly efficient platform that allows multiple users to access various services through virtualization on a shared physical network. The participants in a Cloud Computing (CC) environment include Cloud Service Providers (CSP), Consumers, Brokers, and Auditors. The advantages of cloud storage, such as universal network access, convenience, and scalability, have led to data owners preferring to store their data on remote servers. However, the transfer of outsourced data has become a critical requirement for cloud users due to the availability of different cloud storage services with varying quality of services.


One major challenge in this context is ensuring the security of secret keys and data integrity. There is no guarantee of data integrity when storing data on an untrusted cloud server. To address this issue, this paper proposes a secure and efficient data integrity verification scheme for cloud storage services. The scheme utilizes a key-homomorphic cryptographic primitive to reduce system complexity and eliminate the need for a public key authentication framework based on a public key infrastructure (PKI) in the data integrity checking protocol. By employing this approach, the proposed method ensures the integrity of remote data stored on cloud servers. Through security analysis and empirical evaluation, it is demonstrated that our scheme is both practical and effective for securely sharing records with multiple owners in cloud computing.

Article Details

Section
Articles
Author Biography

P Raja Sekhar Reddy , K Ravindranath

[1]P Raja Sekhar Reddy

2K Ravindranath

 

[1] Research Scholar, Koneru Lakshmaiah Education Foundation, Greenfields, Vaddeswaram, A.P., India

2Associate Professor ,Dept. of CSE, Koneru Lakshmaiah Education Foundation, Greenfields , Vaddeswaram,A.P.,India

E-mail: 1prreddy.cvsr@gmail.com, 2 ravindra_ist@kluniversity.in

 

References

Y. Wang and J. Han, 2017, “Full verifiability for outsourced decryption in attribute-based encryption", IEEE.

X. Tao and C. Yang, 2018, “New publicly verifiable cloud data deletion scheme with efficient tracking,”, pp. 359-372.

K., Wang C, et al, 2016, “Enabling cloud storage auditing with verifiable outsourcing of key updates”. IEEE, pp.1362–1375.

Qin, J., Yu, J., et al, 2019, “Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage”. IEEE, pp.331–346.

Q. Zhang, L. T. Yang, and Z. Chen, “Privacy preserving deep computation model on cloud for big data feature learning,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1351-1362, 2016.

Xiaoyu Li, Jie Chen, 2017, “Two-Factor Data Access Control with Efficient Revocation for Multi-Authority Cloud Storage Systems", pp. 393-405

K. Xue, J. Hong, “Combining data owner-side and cloud-side access control for encrypted cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2062–2074, 2018.

Sushmita Ruj, 2015, "Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption", pp. 1-6.

C. Yang and Y. Wang, 2020, “Secure data transfer and deletion from counting Bloom filter in cloud computing,” Chinese Journal of Electronics, vol. 29, no. 2, pp. 273–280, 2020.

J. Chang and Bian G, 2020, “Certificateless provable data possession protocol for the multiple copies and clouds case,”, pp. 102958–102970.