CFP last date
20 January 2025
Reseach Article

An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method

by Sneha Singha, S. D. Satav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 9
Year of Publication: 2016
Authors: Sneha Singha, S. D. Satav
10.5120/ijca2016910907

Sneha Singha, S. D. Satav . An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method. International Journal of Computer Applications. 146, 9 ( Jul 2016), 41-44. DOI=10.5120/ijca2016910907

@article{ 10.5120/ijca2016910907,
author = { Sneha Singha, S. D. Satav },
title = { An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 9 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 41-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number9/25430-2016910907/ },
doi = { 10.5120/ijca2016910907 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:01.020233+05:30
%A Sneha Singha
%A S. D. Satav
%T An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 9
%P 41-44
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Since a lot of data is dynamically updated and stored in today’s scenario, the previous methods used for checking static data integrity can no longer be applied to analyze the integrity of the stored dynamic data in the cloud. In the existing system, the authors had focused on key management in a built in key exposure resilient system. In this paper, we have introduced the concept of de duplication strategy of data wherein the built-in key exposure resilient system will check the duplicacy of data and eliminate the redundant one using MD5 hashing. This will enforce space management in an efficient manner. Also, tile bitmap technique is used wherein the intrusions can be detected without any tampering of data to maintain its integrity.

References
  1. Jia Yu and Kui Ren, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” in IEEE transactions on information forensics and security, VOL XX, NO1., 2015.
  2. K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
  3. B. Chen and R. Curtmola, “Auditable Version Control Systems,” 2014 Network and Distributed System Security Symposium, 2014.
  4. K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel and Distributed Systems, Vol. 24, No. 9, pp. 1717-1726, 2013.
  5. Y. Zhu, H.G. Ahn, H. Hu, S.S. Yau, H.J. An, and C.J. Hu, “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Trans. on Services Computing, vol. 6, no. 2, pp. 409-428, 2013.
  6. C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, Vol. 62, No. 2, pp. 362-375, 2013.
  7. R. Canetti, S. Halevi and J. Katz, “A forward-secure public-key encryption scheme,” Advances in Cryptology- EUROCRYPT’03, pp. 255-271, 2003.
  8. Imran Ahmad and Hitesh Gupta, “Privacy preserving public auditing and data integrity for secure cloud storage” International conference on cloud, big data and trust 2013, Nov 13-15.
  9. Ebenezer R.H.P. Isaac, Joseph H.R. Isaac and J. Visumathi, “Reverse Circle Cipher for Personal and Network Security” Information Communication and Embedded Systems(ICICES), 2013 International conference, pp 346-351, Feb 2013.
  10. Kyriacos E. Pavlou and Richard T. Snodgrass, “The Tiled Bitmap Forensic Analysis Algorithm” IEEE Trans on knowledge and data engineering, Volume 22, No 4, pp 590 – 601, May 2009.
  11. https://en.wikipedia.org/wiki/MD5.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Third Party Auditor Key-exposure resistance De-duplication Reverse Circle Cipher Tile Bitmap