We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA

by Shivani Gambhir, Ajay Rawat, Rama Sushil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 80 - Number 14
Year of Publication: 2013
Authors: Shivani Gambhir, Ajay Rawat, Rama Sushil
10.5120/13929-1869

Shivani Gambhir, Ajay Rawat, Rama Sushil . Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA. International Journal of Computer Applications. 80, 14 ( October 2013), 18-21. DOI=10.5120/13929-1869

@article{ 10.5120/13929-1869,
author = { Shivani Gambhir, Ajay Rawat, Rama Sushil },
title = { Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 80 },
number = { 14 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume80/number14/13929-1869/ },
doi = { 10.5120/13929-1869 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:54:32.761042+05:30
%A Shivani Gambhir
%A Ajay Rawat
%A Rama Sushil
%T Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA
%J International Journal of Computer Applications
%@ 0975-8887
%V 80
%N 14
%P 18-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is the future of the next generation architecture of IT solutions. Cloud provides computing resources on subscription basis over the internet. The Cloud data storage network includes a Third Party Auditor which has the power and capabilities that a client does not have. It is a trusted entity that has the access to, other than cloud and check on the exposed risk involved in cloud storage data on behalf of the client. In this paper, the problem of data security and integrity has been presented. Also, a scheme to provide maximum data integrity. In proposed scheme, existing fully homomorphic encryption is integrated with TPA auditing system is proposed. This scheme can audit data integrity without decrypting it.

References
  1. Wang, Cong, et al. "Privacy-preserving public auditing for secure cloud storage. " (2013): 1-1.
  2. Xu, Jia. Auditing the auditor: secure delegation of auditing operation over cloud storage. IACR Cryptology ePrint Archive 2011, 2011.
  3. Chuang, I-Hsun, et al. "An effective privacy protection scheme for cloud computing. " Advanced Communication Technology (ICACT), 2011 13th International Conference on. IEEE, 2011.
  4. TEBAA, Maha, Saïd EL HAJJI, and Abdellatif EL GHAZI. "Homomorphic Encryption Applied to the Cloud Computing Security. " Proceedings of the World Congress on Engineering. Vol. 1. 2012.
  5. Sowparnika, Miss M. , and R. Dheenadayalu. "Improving data integrity on cloud storage services. "
  6. Gennaro, Rosario, and Daniel Wichs. Fully homomorphic message authenticators. May 2012. Cryptology eprint 290, 2012.
  7. Wang, Qian, et al. "Enabling public auditability and data dynamics for storage security in cloud computing. " Parallel and Distributed Systems, IEEE Transactions on 22. 5 (2011): 847-859.
  8. Hamlen, Kevin, et al. "Security issues for cloud computing. " International Journal of Information Security and Privacy (IJISP) 4. 2 (2010): 36-48.
  9. Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft). " NIST special publication 800 (2011): 145.
  10. Gentry, Craig. A fully homomorphic encryption scheme. Diss. Stanford University, 2009.
  11. AS, ANUPRIYA, S. Ananthi, and S. Karthik. "TPA BASED CLOUD STORAGE SECURITY TECHNIQUES. " International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 1. 8 (2012): pp-194.
  12. Rivest, R. ; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 120126. doi:10. 1145/359340. 359342
  13. Kaliski, Burt, and Matt Robshaw. "Message authentication with MD5. "CryptoBytes (RSA Labs Technical Newsletter) 1. 1 (1995).
Index Terms

Computer Science
Information Sciences

Keywords

TPA Cloud Auditing Data security and Integrity Fully Homomorphic Encryption