CFP last date
20 December 2024
Reseach Article

An Efficient Public Auditing with Privacy Preserving Identity and Traceability

by Nitesh Kumar Namdeo, Sachin D. Choudhari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 11
Year of Publication: 2016
Authors: Nitesh Kumar Namdeo, Sachin D. Choudhari
10.5120/ijca2016911499

Nitesh Kumar Namdeo, Sachin D. Choudhari . An Efficient Public Auditing with Privacy Preserving Identity and Traceability. International Journal of Computer Applications. 150, 11 ( Sep 2016), 7-10. DOI=10.5120/ijca2016911499

@article{ 10.5120/ijca2016911499,
author = { Nitesh Kumar Namdeo, Sachin D. Choudhari },
title = { An Efficient Public Auditing with Privacy Preserving Identity and Traceability },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 11 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number11/26135-2016911499/ },
doi = { 10.5120/ijca2016911499 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:41.513639+05:30
%A Nitesh Kumar Namdeo
%A Sachin D. Choudhari
%T An Efficient Public Auditing with Privacy Preserving Identity and Traceability
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 11
%P 7-10
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing is a general term for the delivery of hosted services over the internet. Cloud computing enables companies to consume the resources and compute their utility rather than building and maintaining computing infrastructure. A cloud database is a database that has been optimized or built for a virtualized computing environment. Since these data-centers may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. Cloud has been prone to various security issues like storage, computation and attacks like Denial of service, Distributed Denial of Service, Eavesdropping, insecure authentication or logging etc. Privacy preservation is main security issue in public cloud. This paper proposed architecture for privacy preservation and traceability. The implementation results represent that our method is suitable for large organizations.

References
  1. Peter Mell,TimothyGrance,”The NIST definition of cloud computing”,http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
  2. InduArora ,Dr.AnuGupta,”Clouddatabase:A paradigm shift in Databases”IJCI international journal,july 2012.
  3. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic,“Cloud computing and emerging it platforms: Vision, hype, andreality for delivering computing as the 5th utility,” Future GenerationComput. Syst., vol. 25, no. 6, pp. 599–616, 2009.
  4. T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy:An Enterprise Perspective on Risks and Compliance. Sebastopol,CA, USA: O’Reilly Media, Inc., 2009.
  5. Lucca Ferretti,FabioPierazzi,MichelColajani and Micro Marchetti “Performance and cost evaluation ofan adaptive encryption architecture for cloud databases”IEEE transactions on cloud computing,vol 2,no.2,April-June 2014
  6. Boyang Wang, Baochun Li and Hui Li, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2014, pp. 43-57
  7. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession atUntrusted Stores,” Proc. 14th ACM Conf. Computer and Comm.Security (CCS ’07), pp. 598-610, 2007.
  8. H. Shacham and B. Waters, “Compact Proofs of Retrievability,”Proc. 14th Int’l Conf. Theory and Application of Cryptology and InformationSecurity: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.
  9. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,“Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computerand Comm. Security (CCS’09), pp. 213-222, 2009.
  10. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling PublicVerifiability and Data Dynamic for Storage Security in CloudComputing,” Proc. 14th European Conf. Research in Computer Security(ESORICS’09), pp. 355-370, 2009.
  11. C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data StorageSecurity in Cloud Computing,” Proc. 17th Int’l Workshop Quality ofService (IWQoS’09), pp. 1-9, 2009.
  12. B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote DataChecking for Network Coding-Based Distributed Storage Systems,”Proc. ACM Workshop Cloud Computing Security Workshop(CCSW’10), pp. 31-42, 2010.
  13. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S Yau,“Dynamic Audit Services for Integrity Verification of OutsourcedStorages in Clouds,” Proc. ACM Symp. Applied Computing(SAC’11), pp. 1550-1557, 2011.
  14. N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, “LT Codes-BasedSecure and Reliable Cloud Storage Service,” Proc. IEEE INFOCOM,2012.
  15. C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-PreservingPublic Auditing for Secure Cloud Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud database Security Privacy Preservation Auditing Authentication DaaS