Open Access   Article Go Back

Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study

C. Anilkumar Raju1

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 109-115, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.109115

Online published on Mar 20, 2019

Copyright © C. Anilkumar Raju . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: C. Anilkumar Raju, “Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.109-115, 2019.

MLA Style Citation: C. Anilkumar Raju "Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study." International Journal of Computer Sciences and Engineering 07.06 (2019): 109-115.

APA Style Citation: C. Anilkumar Raju, (2019). Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study. International Journal of Computer Sciences and Engineering, 07(06), 109-115.

BibTex Style Citation:
@article{Raju_2019,
author = {C. Anilkumar Raju},
title = {Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {109-115},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=879},
doi = {https://doi.org/10.26438/ijcse/v7i6.109115}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.109115}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=879
TI - Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study
T2 - International Journal of Computer Sciences and Engineering
AU - C. Anilkumar Raju
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 109-115
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud storage system provides helpful file storage and sharing services for distributed purchasers. to handle integrity, manageable outsourcing and origin auditing issues on outsourced files, we have a tendency to propose Associate in Nursing identity-based information outsourcing (IBDO) theme equipped with fascinating options advantageous over existing proposals in securing outsourced information. First, our IBDO theme permits a user to authorize dedicated proxies to transfer information to the cloud storage server on her behalf, e.g., an organization could authorize some staff to transfer files to the company’s cloud account in an exceedingly controlled means. The proxies area unit known and approved with their recognizable identities, that eliminates difficult certificate management in usual secure distributed computing systems. Second, our IBDO theme facilitates comprehensive auditing, i.e., our theme not solely permits regular integrity auditing as in existing schemes for securing outsourced information, however conjointly permits to audit {the information|the knowledge|the information} on data origin, kind and consistence of outsourced files. Security analysis and experimental analysis indicate that our IBDO theme provides robust security with fascinating potency.

Key-Words / Index Term

Cloud storage, information outsourcing, Proof of storage, Remote integrity proof, Public auditing

References

[1] D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud information protection for the plenty,” Computer, IEEE, vol. 45, no. 1, pp. 39–45, Jan 2012.
[2] C.-K. Chu, W.-T. Zhu, J. Han, J. Liu, J. Xu, and J. Zhou, “Security issues in widespread cloud storage services,” Pervasive Computing, IEEE, vol. 12, no. 4, pp. 50–57, Oct 2013.
[3] K. Yang and X. Jia, “Data storage auditing service in cloud com- puting: challenges, strategies and opportunities.
[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Pe- terson, and D. Song, “Provable information Possession at Untrusted Stores,” in Proceedings of the fourteenth ACM Conference on laptop and Communications Security. New York, NY, USA: ACM, 2007, pp. 598–609.
[5] J. Sun and Y. Fang, “Cross-Domain information Sharing in Distributed Electronic Health Record Systems,” Parallel and Distributed System- s, IEEE Transactions on, vol. 21, no. 6, pp. 754–764, 2010.
[6] J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryptography based mostly Secure EHR System for Patient Privacy and Emergency care,” in Distributed Computing Systems (ICDCS), 2011 IEEE thirty first International Conference on. IEEE, 2011, pp. 373–382.