scholarly journals Data Outsourcing with Secure Data Auditing in Cloud Computing

2018 ◽  
Vol Volume-2 (Issue-4) ◽  
pp. 322-324
Author(s):  
J. Gopinadh ◽  
2020 ◽  
Vol 16 (5) ◽  
pp. 155014772091662
Author(s):  
Jun-Feng Tian ◽  
Hao-Ning Wang

With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.


2018 ◽  
Vol 6 (9) ◽  
pp. 723-731
Author(s):  
Rakesh Prasad Sarang ◽  
Anshu Chaturvedi ◽  
D.N. Goswami

2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  

2021 ◽  
Vol 1055 (1) ◽  
pp. 012108
Author(s):  
M Arumugam ◽  
S Deepa ◽  
G Arun ◽  
P Sathishkumar ◽  
K Jeevanantham

Author(s):  
Rokesh Kumar Yarava ◽  
Ponnuru Sowjanya ◽  
Sowmya Gudipati ◽  
G. Charles Babu ◽  
Srisailapu D Vara Prasad

2017 ◽  
Vol 2017 ◽  
pp. 1-13 ◽  
Author(s):  
Jian Mao ◽  
Wenqian Tian ◽  
Yan Zhang ◽  
Jian Cui ◽  
Hanjun Ma ◽  
...  

With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing), new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.


Sign in / Sign up

Export Citation Format

Share Document