Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:
0976-4151


  About JISR
  DLINE Portal Home
Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Subscription
Contact us
 
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
 
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)

 

 
Journal of Information Security Research

Secure and Efficient Third-party Auditing Scheme for Cloud Storage
Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel
School of Information Science and Engineering, Central South University, Changsha 410083, China & Computer Science Department, College of Science, University of Diyala, Iraq
Abstract: In the cloud environment, pay-per-use is used to provide services for the end-users. With all the benefits available, a threat is present in the security of sensitive data. Users of the cloud cannot rely on cloud service providers for the security of data. In this work we present a model of cloud system that supports privacy-preserving and public auditing. The design introduced now has three components such as data owner, cloud server, and third-party auditor (TPA). In this proposed model the data owner first encrypts the data using the Advanced Encryption Standard (AES) algorithm and applies a Steganography technique by combining Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) in order to hide the encrypted data and subsequently save them on a cloud server. In the next phase, the SHA-2 value is developed for the hidden file and creates a signature on it. The Third Party Auditor then next authorize the data onto the cloud instead of data owners by generating the value of the SHA-2 and create a signature on it, eventually, compares both signatures to verify the data integrity. We thus intend to produce an efficient and secure system that is capable of privacy preserving public auditing maintaining the data confidentiality and integrity. In the experimentation process, it is found that the security and performance have recorded a good level of security and found to me more efficient.
Keywords: Cloud Computing, Privacy-preserving Public Auditing, Data Integrity, Data Confidentiality, Third-party Auditor Secure and Efficient Third-party Auditing Scheme for Cloud Storage
DOI:https://doi.org/10.6025/jisr/2020/11/3/67-74
Full_Text   PDF 142 KB   Download:   126  times
References:

[1] Wang, G., Liu, Q., Wu, J., Guo, M. (2011). Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers& security, 30 (5) 320-331.
[2] El-Booz, S. A., Attiya, G., El-Fishawy, N. (2016). A secure cloud storage system combining time-based one-time password and automatic blocker protocol. EURASIP Journal on Information Security, 2016 (1), 13.
[3] Dong, X., Yu, J., Luo, Y., Chen, Y., Xue, G., Li, M. (2014). Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Computers & Security, 42, 151-164.
[4] Wang, C., Chow, S. S., Wang, Q., Ren, K., Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE transactions on computers, 62 (2) 362-375.
[5] Glabb, R., Imbert, L., Jullien, G., Tisserand, A., Veyrat-Charvillon, N. (2007). Multi-mode operator for SHA-2 hash functions. journal of systems architecture, 53 (2) 127-138.
[6] Narula, N., Sethi, D., Bhattacharya, P. P. (2015). Comparative Analysis of DWT and DWT-SVD Watermarking Techniques in RGB Images. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8 (4) 339-348.
[7] Subhedar, M. S., Mankar, V. H. (2014 November). High Capacity Image Steganography based on Discrete Wavelet Transform and Singular Value Decomposition. In: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies (p. 63). ACM.
[8] Worku, S. G., Xu, C., Zhao, J., He, X. (2014). Secure and efficient privacy-preserving public auditing scheme for cloud storage. Computers & Electrical Engineering, 40 (5) 1703-1713.
[9] Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 5 (2) 220-232.
[10] Loheswaran, K., Premalatha, J. (2016). Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing. Wireless Personal Communications, 90 (2) 1051-1066.
[11] Wang, Q., Wang, C., Ren, K., Lou, W., Li, J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22 (5) 847-859.


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|

 

Copyright © 2011 dline.info