Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


An Efficient RSA Based Data Integrity Schema in Secured Cloud Storage

S. Hemalatha and Dr. R. Manickachezian
Department of Computer Science, N.G.M. College, Pollachi, Coimbatore, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology  2014  20:2103-2109
http://dx.doi.org/10.19026/rjaset.8.1204  |  © The Author(s) 2014
Received: June ‎17, ‎2014  |  Accepted: ‎July ‎13, ‎2014  |  Published: November 25, 2014

Abstract

This study aim is to address the problem of outsourcing data. Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a utility over a network. The imperative feature of cloud services is that the user data are frequently processed remotely in unidentified machines that users do not own or operate. Due to this reason, the data owner loss their original data and it becomes an important obstruction to the extensive implementation of cloud services. This study introduces the term data accountability based encryption and users can substitute to a Third-Party Auditor (TPA) for the verification of data integrity problem. This study proposes the security of the outsourced data in cloud by generating keys for each cloud user attribute with Attribute Based Encryption (ABE) using Efficient RSA (Rivest, Shamir, Adleman) schema and Ring Based Fully Homomorphic Encryption (RBFHE) schema for uploading user data.

Keywords:

Cloud computing, data accountability, data integrity, data storage, public auditability,


References

  1. Aboud, S.J., M.A. Alfayoumi, M. Alfayoumi and H. Jabbar, 2008. An efficient RSA public key encryption scheme. Proceeding of the 5th International Conference on Information Technology: New Generations (ITNG), Las Vegas, pp: 127-130.
    CrossRef    
  2. Amazon.com, 2008. Amazon s3.Retrieved from: http://status.aws.amazon.com/s3-20080720. html (Accessed on: July 20, 2008).
  3. Arrington, M., 2006. Gmail Disaster: Reports of Mass Email Deletions. Retrieved from: http://www.techcrunch.com/2006/12/28/gmail-disasterreports of-mass-email-deletions/.
  4. Ateniese, G., R.D. Pietro, L.V. Mancini and G. Tsudik, 2008. Scalable and efficient provable data possession. Proceeding of the International Conference on Security and Privacy in Communication Networks (SecureComm'08), pp: 1-10.
    CrossRef    
  5. Calheiros, R.N., R. Ranjan, C.A.F.D. Rose and R. Buyya, 2009. CloudSim: A novel framework for modeling and simulation of cloud computing infrastructures and services. Technical Report, GRIDS-TR-2009-1, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia.
  6. Calheiros, R.N., R. Ranjan, A. Beloglazov, C.A.F. De Rose and R. Buyya, 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software Pract. Exper., 2011: 23-50.
    CrossRef    
  7. Chun, B. and A.C. Bavier, 2004. Decentralized trust management and accountability in federated system. Proceeding of the Annial Hawaii International Conference on System Science (HICSS).
    CrossRef    
  8. Cloud Security Alliance, 2010. Top Threats to Cloud Computing. Retrieved from: http://www. Cloud securityalliance.org.
  9. Crispo, B. and G. Ruffo, 2001. Reasoning about accountability within delegation. Proceeding of the 3rd International Conference on Information and Communication Security (ICICS), pp: 251-260.
    CrossRef    
  10. Erway, C., A. Kupcu, C. Papamanthou and R. Tamassia, 2009. Dynamic provable data possession. Proceeding of the ACM Conference on Computer and Communication Security (CCS'09), pp: 213-222.
    CrossRef    
  11. Hemalatha, S. and R. Manickachezian, 2012. Present and future of cloud computing: A collaborated survey report. Int. J. Innov. Technol. Exploring Eng., 1(2).
  12. Hemalatha, S. and R. Manickachezian, 2013. Implicit security architecture framework in cloud computing based on data partitioning and security key distribution. Int. J. Emerg. Technol. Comput. Appl. Sci., 2013: 76-81.
  13. Kincaid, J., 2008. MediaMax/TheLinkup Closes Its Doors. Retrieved from: http://www.techcrunch. com/2008/07/10/media maxthelinkup-closesits-doors/.
  14. Lee, W., A. Cinzia Squicciarini and E. Bertino, 2009. The design and evaluation of accountable grid computing system. Proceeding of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS'09), pp: 145-154.
    CrossRef    
  15. Pearson, S., 2009. Taking account of privacy when designing cloud computing services. Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (CLOUD '09), pp: 44-52.
    CrossRef    
  16. Pearson, S., Y. Shen and M. Mowbray, 2009a. A privacy manager for cloud computing. Proceedings of the International Conference on Cloud Computing (cloudcom), pp: 90-106.
    CrossRef    
  17. Pearson, S., A.C. Squicciarini and D. Lin, 2009b. Accountability as a way forward for privacy protection in the cloud. Proceeding of the 1st International Conference on Cloud Computing.
    CrossRef    
  18. Sundareswaran, S. and A.C. Squicciarini, 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE T. Depend. Secure, 9(4): 556-568.
    CrossRef    
  19. Wang, C., Q. Wang, K. Ren and W. Lou, 2010a. Privacy-preserving public auditing for data storage security in cloud computing. Proceeding of the IEEEINFOCOM, San Diego, CA, pp: 525-533.
    CrossRef    
  20. Wang, Q., C. Wang, K. Ren, W. Lou and J. Li, 2010b. Enabling public auditability and data dynamics for storages security in cloud computing. Proceeding of the IEEEINFOCOM, pp: 525-533.
  21. Wang, C., Q. Wang, K. Ren and W. Lou, 2012. Towards secure and dependable storage services in cloud computing. IEEE T. Serv. Comput., 5(2): 220-232.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved