Content arrangement characteristic based encryption in cloud using public auditing for data management

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The encryption standard related to cryptography provide the possible keys with logical standard for sharing and distributing sensitive information sharing worldview in conveyed frameworks. A Content Arrangement Characteristic Based Encryption (CA-CBE) is turning into a promising cryptographic solution for this issue.  The cloud needs to provide the view on open auditability. Many methodologies have been discussed on dynamic information administration and on general auditability, however those methodologies suffer from the issue of check overhead and time multifaceted nature. Therefore, it is important to propose a Content Arrangement Characteristic Based Encryption (CA-CBE) scheme for supporting data dynamics over the data operation, like block alteration, block inset, and deletion. Some existing data integrity based research always lacks in dynamic operations and public auditability. By considering this as a motivation, this research is initiated. 

  • Keywords

    Cloud, content arrangement characteristic based encryption, outsider auditing, cryptography.

  • References

      [1] Tajan L, Westhoff D, Reuter CA & Armknecht F, “Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing”, 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 162-169, (2016).

      [2] Bellessa J, Kroske E, Farivar R, Montanari M, Larson K & Campbell RH, “NetODESSA: Dynamic policy enforcement in cloud networks”, 30th IEEE Symposium on Reliable Distributed Systems Workshops (SRDSW), pp. 57-61, (2011).

      [3] Dsouza C, Ahn GJ & Taguinod M, “Policy-driven security management for fog computing: Preliminary framework and a case study”, IEEE 15th International Conference on Information Reuse and Integration (IRI), pp. 16-23, (2014)

      [4] Kai H, Chuanhe H, Jinhai W, Hao Z, Xi C, Yilong L, Lianzhen Z & Bin W, “An efficient public batch auditing protocol for data security in multi-cloud storage”, 8th ChinaGrid Annual Conference (ChinaGrid), pp. 51-56, (2013).

      [5] Lee JH, “Secure authentication with dynamic tunneling in distributed IP mobility management”, IEEE Wireless Communications, Vol.23, No.5, pp.38-43, (2016).

      [6] Liu C, Ranjan R, Yang C, Zhang X, Wang L & Chen J, “MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud”, IEEE Transactions on Computers, Vol.64, No.9, pp.2609-2622, (2015).

      [7] Praveena A & Sasikala C, “Multi authority attribute based encryption against data integrity and scalability issues in cloud data services”, International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1-5, (2015).

      [8] Suganthi J, Ananthi J & Archana S, “Privacy preservation and public auditing for cloud data using ASS in multi-cloud”, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp.1-6, (2015).

      [9] Gopinathan R & Manimegalai P, “Energy and Latency Aware Position Based Packet Forwarding Protocol for Wireless Sensor Networks”, Republication, (2016).

      [10] Xia Z, Wang X, Sun X & Wang Q, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data”, IEEE Transactions on Parallel and Distributed Systems, Vol.27, No.2, pp.340-352, (2016).

      [11] Farahnakian F, Pahikkala T, Liljeberg P & Plosila J, “Hierarchical agent-based architecture for resource management in cloud data centers”, IEEE 7th International Conference on Cloud Computing (CLOUD), pp. 928-929, (2014).

      [12] Garg A, Venu V & Bhatnagar MR, “One bit feedback based diagonal precoding for non-orthogonal space-time block codes”, IEEE Wireless Communications Letters, Vol.4, No.5, pp.573-576, (2015).

      [13] Surendar, A., George, A.”A real-time searching and sequencing assembly platform based on an FPGA implementation for Bioinformatics applications”,(2016) International Journal of Pharma and Bio Sciences, 7 (4), pp. B642-B647.

      [14] Surendar, A., Arun, M.”FPGA based multi-level architecture for next generation DNA sequencing”,(2016) Biomedical Research (India), 2016, pp. S75-S79.

      [15] Surendar, A., Arun, M., Basha, A.M.”Micro sequence identification of bioinformatics data using pattern mining techniques in FPGA hardware implementation”,(2016) Asian Journal of Information Technology, 15 (1), pp. 76-81.

      [16] Prabu, G., Surendar, A.”Virus detection by using a pattern matching algorithm for network security”,(2015) International Journal of Applied Engineering Research, 10 (10), pp. 9565-9569.

      [17] Mahesh A & Manimegalai P, “An efficient data processing architecture for smart environments using large scale machine learning”, IIOAB Journal, Special Issue, Emerging Technologies in Networking and Security, Vol.7, No.9, pp.795-803, (2016).

      [18] Kaseb AS, Mohan A & Lu YH, “Cloud resource management for image and video analysis of big data from network cameras”, International Conference on Cloud Computing and Big Data (CCBD), pp. 287-294, (2015).

      [19] Li J, “Optimal resource capacity management for stochastic loss network systems with applications in clouds and data centers”, IEEE 55th Conference on Decision and Control, pp.5384-5389, (2016).

      [20] Salas-Duarte S, Araujo-Vargas I, Flores-Alcotzi O, Ramirez-Hernandez J & Del Muro-Cuellar B, “Experimental verification of a one-step ahead current control scheme for an active rectifier”, IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), pp. 1-6, (2014).

      [21] Singla P, Kumar P, Das A, Sardana V & Sardana HK, “Image registration: A pre-step in patient's position verification in radiation therapy”, International Conference on Image Information Processing (ICIIP), pp. 1-4.

      [22] Wadhwa S, Ahmad M & Vijay H, “Chaotic hash function based plain-image dependent block ciphering technique”, International Conference on Advances in Computing, Communications and Informatics, pp. 633-637, (2016).

      [23] Xiao W, Shi, G, Li, B, Xu J & Wu F, “Fast Hash-based Inter Block Matching for Screen Content Coding”, IEEE Transactions on Circuits and Systems for Video Technology, (2016).




Article ID: 8918
DOI: 10.14419/ijet.v7i1.1.8918

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.