International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 179 - Number 34 |
Year of Publication: 2018 |
Authors: Jennifer Batamuliza |
10.5120/ijca2018916731 |
Jennifer Batamuliza . Efficient and Privacy Preserving Protocol against Insider Attack for Data Storage in Cloud Computing. International Journal of Computer Applications. 179, 34 ( Apr 2018), 27-36. DOI=10.5120/ijca2018916731
Cloud computing provides remote users a flexible and convenient way to obtain cloud services on demand such as cloud storage service, which has been facing great security and privacy challenges, especially insider attacks. However, most of the previous work on the cloud security focusing on the storage security can’t be effective against insider threats. Wei’s scheme on the cloud storage, which is based on an ID-based strong designated verifier signature (IBSDVS) protocol, takes privacy and confidentiality into consideration. But it also can’t be against insider attacks and its confidentiality exists security flaws. Hence, in this paper, we propose an efficient data storage protocol in the cloud computing, which can be against insider attacks as well as providing privacy preserving and confidentiality. Similar to Wei’s scheme, our protocol adopts an IBSDVS scheme that has the secure property of non-delegatability. Then the analysis of security and performance are described in detail.