Open Access   Article Go Back

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

A. Ashik Hussain1 , R.C. Subashini2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 400-405, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.400405

Online published on Apr 30, 2019

Copyright © A. Ashik Hussain, R.C. Subashini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A. Ashik Hussain, R.C. Subashini, “Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.400-405, 2019.

MLA Style Citation: A. Ashik Hussain, R.C. Subashini "Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud." International Journal of Computer Sciences and Engineering 7.4 (2019): 400-405.

APA Style Citation: A. Ashik Hussain, R.C. Subashini, (2019). Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud. International Journal of Computer Sciences and Engineering, 7(4), 400-405.

BibTex Style Citation:
@article{Hussain_2019,
author = {A. Ashik Hussain, R.C. Subashini},
title = {Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {400-405},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4049},
doi = {https://doi.org/10.26438/ijcse/v7i4.400405}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.400405}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4049
TI - Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
T2 - International Journal of Computer Sciences and Engineering
AU - A. Ashik Hussain, R.C. Subashini
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 400-405
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
370 220 downloads 106 downloads
  
  
           

Abstract

Computing capacity and storage space need of these devices are ever-increasing tremendously, it demands the secure way of storing the data in cost efficient model. There are vast numbers of users who use cloud services through mobile devices such as mobiles, PDA, tablets, laptops outstanding to its portability feature. Cloud Computing has many advantages inherent in it, but yet there are several risks and constraint exists, for e.g. protection, data access control, efficiency, bandwidth, etc a novel remote data integrity checking model: IDP (identity-based proxy) in multi-cloud storage. The formal system model and security model are given. Based on the bilinear pairings, a concrete IDP protocol is designed.To analyze the efficiency of various well known cryptographic algorithms such as Identity-based cryptography,Proxy public key cryptography, these symmetric algorithms were implemented on cloud background and through the results derived from real time implementation of these algorithms on various handheld procedure, it is shown that which cryptographic technique can provide efficient and reliable security mechanism for information access control and security of user’s outsourced information in cloud computing.

Key-Words / Index Term

Data security, Cryptographic techniques; Identity-based cryptography, Proxy public key cryptography

References

[1]. Kumar, K., Lu, Y.-H.: Yung-Hsiang Lu: Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer 43(4), 51– 56 (2010)
[2]. Simoens, P., De Turck, F., Dhoedt, B., Demeester, P.: Remote Display Solutions for Mobile Cloud Computing. Computer 44(8), 46–53 (2011)
[3]. Ayesha Malik, Muhammad Mohsin Nazir, "Security Framework for Cloud Computing Environment: A Review," Journal of Emerging
Trends in Computing and Information Sciences, 2012.
[4]. Shashi Mehrotra Seth, Rajan Mishra, “Comparative Analysis Of Encryption Algorithms For Data Communication," IJCST Vol. 2, Iss ue 2,
June 20 I I .
[5]. Shahryar Shafique Qureshi1 , Toufeeq Ahmad1, Khalid Rafique2, Shuja-ul-islam3 “Mobile cloud computing as future for mobile applications – implementation methods and challenging issues”-2011.
[6]. Mell P, Grance T (2011) The NIST definition of Cloud Computing. NIST, Special Publication 800–145, Gaithersburg, MD
[7]. 29. Zhang Q, Cheng L, Boutaba R (2010) Cloud Computing: state-of-the-art and research challenges. Journal of Internet Services Applications 1(1):7–18
[8]. Pearson, S., Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing”, in Proceedings of the 1st International Conference on Cloud Computing. 2009, Springer-Verlag: Beijing, China. p. 90-106.
[9]. Wang, Q., et al., “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, in Computer Security – ESORICS 2009, M. Backes and P. Ning, Editors. 2009, Springer Berlin / Heidelberg. p. 355-370.
[10]. Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. A Survey of Mobile Cloud Computing: Architecture Applications, and Approaches,In Wireless Communications and Mobile Computing 2011.
[11]. Wei Ren, Linchen Yu, Ren Gao, Feng Xiong.Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing. Tsinghua Science And Technology,ISSNl1007-0214ll06/09llpp520 528.Volume 16, Number 5, October 2011.
[12]. Liu Q, Wang G, Wu J. Efficient sharing of secure cloud storage services. In: 2010 IEEE 10th International Conference on Computer and
Information Technology (CIT10). Bradford, West Yorkshire, UK, 2010: 922-929.
[13]. Jim Luo And Myong Kang, 2011.“Application Lockbox for mobile device security” Aman Sagar, Sanjeev Kumar, Palladium in Cryptography:HCTL Open International Journal of Technology Innovations and Research, Volume 7,January 2014, ISSN: 2321-1814, ISBN: 978-1-62951-250-1.
[14]. P. Syam Kumar, R. Subramanian and D. Thamizh Selvam, Ensuring Data Storage Security in Cloud Computing using Sobol Sequence, 978-
1-4244- 7674-9/10., IEEE, 2010.
[15]. Rahul Bhatnagar, Suyash Raizada, Pramod Saxena, SECURITY IN CLOUD COMPUTING ,International Journal For Technological
Research In Engineering, ISSN (Online) : 2347 4718, December - 2013.
[16]. Venkata Sravan Kumar, Maddineni Shivashanker Ragi, Security Techniques for Protecting Data in Cloud Computing, Master SE – 371 79 Karlskrona Sweden, November 2011.
[17]. K. Kumar and Y. H. Lu, “Cloud Computing For Mobile Users: Can Offloading Computation Save Energy?,” IEEE Journal Computer,
vol.43, pp. 51-56, April 2010.
[18]. E. Lagerspetz and S. Tarkoma, “Mobile Search and the Cloud: The Benefits of Offloading,” IEEE International Conference on Workshops (PERCOM Workshops), pp. 117–122, March 2011.
[19]. X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham , and S. Jeong, “Securing Elastic Applications on Mobile Devices for Cloud
Computing,” Proc.
[20]. W. Ren, L. Yu, R. Gao, and F. Xiong, “Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing,” vol. 16, pp.520-528, October 2011.