Open Access   Article Go Back

Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing

Ankit Chamoli1 , Anshika Goyal2

  1. Computer Science and Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.
  2. Computer Science and Engineering, Faculty of Technology, Uttarakhand Technical University, Dehradun, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 1123-1128, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.11231128

Online published on May 31, 2018

Copyright © Ankit Chamoli, Anshika Goyal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ankit Chamoli, Anshika Goyal , “Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1123-1128, 2018.

MLA Style Citation: Ankit Chamoli, Anshika Goyal "Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing." International Journal of Computer Sciences and Engineering 6.5 (2018): 1123-1128.

APA Style Citation: Ankit Chamoli, Anshika Goyal , (2018). Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing. International Journal of Computer Sciences and Engineering, 6(5), 1123-1128.

BibTex Style Citation:
@article{Chamoli_2018,
author = {Ankit Chamoli, Anshika Goyal },
title = {Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {1123-1128},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2118},
doi = {https://doi.org/10.26438/ijcse/v6i5.11231128}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.11231128}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2118
TI - Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Ankit Chamoli, Anshika Goyal
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 1123-1128
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
833 345 downloads 278 downloads
  
  
           

Abstract

Cloud computing gives shared pool of assets (computers resources like networks, server and storage) on the demand of the user in ubiquitous and simple way that can be provisioned to the user with a very little management effort. The basic concept of cloud computing can be understood by the following definition according to NIST. It can be concluded from the above discussions that the demands required by the user are fulfilled by the cloud computing. These demands include both hardware and software resources which are present on the internet. A shared pool of resources is provided by the cloud computing provider which can be accessed by the users as per their demands. The users subscribe as per their requirements and access the resources until it wants to. Virtualization is the technique which helps in providing such services and also in reducing the cost of implementation and also adding hardware parts which will help in meeting the requirements of the user. The PDPT and NTBPRET are the techniques which ensure the data integrity.

Key-Words / Index Term

Mobile cloud computing, secure data distribution, data integrity, access control, proxy re-encryption.

References

[1] Shui Han, Jianchuan Xing, “Ensuring Data Storage Through A Novel Third Party Auditor Scheme in Cloud Computing” , 2011, IEEE computer science & Technology, pp 264-268.
[2] Bhavna Makhija, VinitKumar Gupta, “Enhanced Data Security in Cloud Computing with Third Party Auditor”, 2013, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345
[3] Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, pp. 485-492, 2016.
[4] Saranya Eswaran, Dr. Sunitha Abburu, “Identifying Data Integrity in the Cloud Storage”, IJCSI International Journal of Computer Science Issues, vol. 9, pp. 403-408, 2012.
[5] Gaurav Pachauri, Subhash Chand Gupta, “ENSURING DATA INTEGRITY IN CLOUD DATA STORAGE”, IJCSNS International Journal of Computer Science and Network Security, vol. 14, pp. 34-38, 2014.
[6] S. P. Jaikar, M. V. Nimbalkar, “Verifying Data Integrity in Cloud”, International Journal of Applied Information Systems (IJAIS), vol. 3, pp. 38-46, 2012.
[7] Anchal Srivastava, Ashutosh sehgal, Vikas Kumar Singh, Nitish Kumar Bose, “Provable data possession for integrity verification”, 2014, International Refereed Journal of Engineering and Science (IRJES), Volume 3, Issue 4
[8] Preeti Siroh and Amit Agarwal, “Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust”, 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015)
[9] Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang, “One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage”, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications
[10] Andrey N. Rukavitsyn, Konstantin A. Borisenko, Ivan I. Holod, Andrey V. Shorov, “The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing”, 2017, IEEE
[11] G. Ateniese, R. D. Pietro, L. V. Mancini, G. Tsudik, “Scalable and Efficient Provable Data Possession”, in Proceedings of SecureComm, vol. 2, pp. 23-28, 2008.
[12] Benoˆıt Libert and Damien Vergnaud. Unidirectional chosenciphertext secure proxy re-encryption. Information Theory, IEEE Transactions on, 57(3):1786 –1802, march 2011.
[13] Qiang Tang. Type-based proxy re-encryption and its construction. In DipanwitaRoy Chowdhury, Vincent Rijmen, and Abhijit Das,editors, Progress in Cryptology - INDOCRYPT 2008, volume 5365 of Lecture Notes in Computer Science, pages 130–144. Springer Berlin Heidelberg, 2008.
[14] Parsi, K., & M.Laharika, “A Comparative Study of Different Deployment Models in a Cloud”, 2013, International Journal of Advanced Research in Computer Science and Software Engineering , 3 (5), 512-515.
[15] Srinivas.J, K. Venkata Subba Reddy, Dr. A. Moiz Qyser, “Cloud Computing Basics”, 2012, International journal of advanced research in computer and communication engineering , pp. 343-347
[16] Seyyed Mansur Hosseini and Mostafa Ghobaei Arani,” Fault-Tolerance Techniques in Cloud Storage: A Survey”, 2015, International Journal of Database Theory and Application, Vol.8, No.4 (2015), pp.183-190
[17] SookKyong Choi, KwangSik Chung, Heonchang Yu,” Fault tolerance and QoS scheduling using CAN in mobile social cloud computing”, 2013, Springer Science+Business Media New York
[18] Dr. Lakshmi Prasad Saikia, Yumnam Langlen Devi,” FAULT TOLEREANE TECHNIQUES AND ALGORITHMS IN CLOUD COMPUTING”, International Journal of Computer Science & Communication Networks, Vol 4(1),01-08
[19] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, “Provable Data Possession at Untrusted Stores”, in Proceedings of 14th ACM Conf. Computer and Comm, Security (CCS ’07), vol. 5, pp. 231-238, 2007.
[20] MS. R. K. Pandya, prof. K. K. Sutaria, “Data integrity techniques in cloud: an analysis”, journal of information, knowledge and research in computer engineering”, vol. 2, pp. 413-417, 2012.
[21] Soumya Ray and Ajanta De Sarkar, “Execution Analysis of Load Balancing Algorithm in Cloud computing Environment”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.5, October 2012
[22] Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
[23] Tushar Desai, Jignesh Prajapati, “A Survey of Various Load Balancing Techniques and Challenges in Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 11, NOVEMBER 2013
[24] Vimmi Pandey, “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4, 2013
[25] Anandita Singh Thakur, P.K. Gupta, and Punit Gupta, “Handling Data Integrity Issue in SaaS Cloud”, 2014, Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 127– Vol. 2, Advances in Intelligent Systems and Computing
[26] Jiang Zhang, Zhenfeng Zhang, Hui Guo. "Towards Secure Data Distribution Systems in Mobile Cloud Computing", IEEE Transactions on Mobile Computing, 2017
[27] RezaOsamaRandal CurtmolaKhanBurns. "Robust remote data checking", Proceedings of the 4th ACM international workshop on Storage security and survivability - StorageSS 08 StorageSS 08, 2008
[28] ZHU, YAN, SHANBIAO WANG, HONGXIN HU, GAIL-JOON AHN, and DI MA. "SECURE COLLABORATIVE INTEGRITY VERIFICATION FOR HYBRID CLOUD ENVIRONMENTS", International Journal of Cooperative Information Systems, 2012.