Content arrangement characteristic based encryption in cloud using public auditing for data management

  • Authors

    • V. Joseph Michael Jerard
    • P. Manimegalai
    2017-12-21
    https://doi.org/10.14419/ijet.v7i1.1.8918
  • Cloud, content arrangement characteristic based encryption, outsider auditing, cryptography.
  • The encryption standard related to cryptography provide the possible keys with logical standard for sharing and distributing sensitive information sharing worldview in conveyed frameworks. A Content Arrangement Characteristic Based Encryption (CA-CBE) is turning into a promising cryptographic solution for this issue.  The cloud needs to provide the view on open auditability. Many methodologies have been discussed on dynamic information administration and on general auditability, however those methodologies suffer from the issue of check overhead and time multifaceted nature. Therefore, it is important to propose a Content Arrangement Characteristic Based Encryption (CA-CBE) scheme for supporting data dynamics over the data operation, like block alteration, block inset, and deletion. Some existing data integrity based research always lacks in dynamic operations and public auditability. By considering this as a motivation, this research is initiated. 

  • References

    1. [1] Tajan L, Westhoff D, Reuter CA & Armknecht F, “Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditingâ€, 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 162-169, (2016).

      [2] Bellessa J, Kroske E, Farivar R, Montanari M, Larson K & Campbell RH, “NetODESSA: Dynamic policy enforcement in cloud networksâ€, 30th IEEE Symposium on Reliable Distributed Systems Workshops (SRDSW), pp. 57-61, (2011).

      [3] Dsouza C, Ahn GJ & Taguinod M, “Policy-driven security management for fog computing: Preliminary framework and a case studyâ€, IEEE 15th International Conference on Information Reuse and Integration (IRI), pp. 16-23, (2014)

      [4] Kai H, Chuanhe H, Jinhai W, Hao Z, Xi C, Yilong L, Lianzhen Z & Bin W, “An efficient public batch auditing protocol for data security in multi-cloud storageâ€, 8th ChinaGrid Annual Conference (ChinaGrid), pp. 51-56, (2013).

      [5] Lee JH, “Secure authentication with dynamic tunneling in distributed IP mobility managementâ€, IEEE Wireless Communications, Vol.23, No.5, pp.38-43, (2016).

      [6] Liu C, Ranjan R, Yang C, Zhang X, Wang L & Chen J, “MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloudâ€, IEEE Transactions on Computers, Vol.64, No.9, pp.2609-2622, (2015).

      [7] Praveena A & Sasikala C, “Multi authority attribute based encryption against data integrity and scalability issues in cloud data servicesâ€, International Conference on Innovations in Information, Embedded and Communication Systems, pp. 1-5, (2015).

      [8] Suganthi J, Ananthi J & Archana S, “Privacy preservation and public auditing for cloud data using ASS in multi-cloudâ€, International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp.1-6, (2015).

      [9] Gopinathan R & Manimegalai P, “Energy and Latency Aware Position Based Packet Forwarding Protocol for Wireless Sensor Networksâ€, Republication, (2016).

      [10] Xia Z, Wang X, Sun X & Wang Q, “A secure and dynamic multi-keyword ranked search scheme over encrypted cloud dataâ€, IEEE Transactions on Parallel and Distributed Systems, Vol.27, No.2, pp.340-352, (2016).

      [11] Farahnakian F, Pahikkala T, Liljeberg P & Plosila J, “Hierarchical agent-based architecture for resource management in cloud data centersâ€, IEEE 7th International Conference on Cloud Computing (CLOUD), pp. 928-929, (2014).

      [12] Garg A, Venu V & Bhatnagar MR, “One bit feedback based diagonal precoding for non-orthogonal space-time block codesâ€, IEEE Wireless Communications Letters, Vol.4, No.5, pp.573-576, (2015).

      [13] Surendar, A., George, A.â€A real-time searching and sequencing assembly platform based on an FPGA implementation for Bioinformatics applicationsâ€,(2016) International Journal of Pharma and Bio Sciences, 7 (4), pp. B642-B647.

      [14] Surendar, A., Arun, M.â€FPGA based multi-level architecture for next generation DNA sequencingâ€,(2016) Biomedical Research (India), 2016, pp. S75-S79.

      [15] Surendar, A., Arun, M., Basha, A.M.â€Micro sequence identification of bioinformatics data using pattern mining techniques in FPGA hardware implementationâ€,(2016) Asian Journal of Information Technology, 15 (1), pp. 76-81.

      [16] Prabu, G., Surendar, A.â€Virus detection by using a pattern matching algorithm for network securityâ€,(2015) International Journal of Applied Engineering Research, 10 (10), pp. 9565-9569.

      [17] Mahesh A & Manimegalai P, “An efficient data processing architecture for smart environments using large scale machine learningâ€, IIOAB Journal, Special Issue, Emerging Technologies in Networking and Security, Vol.7, No.9, pp.795-803, (2016).

      [18] Kaseb AS, Mohan A & Lu YH, “Cloud resource management for image and video analysis of big data from network camerasâ€, International Conference on Cloud Computing and Big Data (CCBD), pp. 287-294, (2015).

      [19] Li J, “Optimal resource capacity management for stochastic loss network systems with applications in clouds and data centersâ€, IEEE 55th Conference on Decision and Control, pp.5384-5389, (2016).

      [20] Salas-Duarte S, Araujo-Vargas I, Flores-Alcotzi O, Ramirez-Hernandez J & Del Muro-Cuellar B, “Experimental verification of a one-step ahead current control scheme for an active rectifierâ€, IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC), pp. 1-6, (2014).

      [21] Singla P, Kumar P, Das A, Sardana V & Sardana HK, “Image registration: A pre-step in patient's position verification in radiation therapyâ€, International Conference on Image Information Processing (ICIIP), pp. 1-4.

      [22] Wadhwa S, Ahmad M & Vijay H, “Chaotic hash function based plain-image dependent block ciphering techniqueâ€, International Conference on Advances in Computing, Communications and Informatics, pp. 633-637, (2016).

      [23] Xiao W, Shi, G, Li, B, Xu J & Wu F, “Fast Hash-based Inter Block Matching for Screen Content Codingâ€, IEEE Transactions on Circuits and Systems for Video Technology, (2016).

  • Downloads

  • How to Cite

    Jerard, V. J. M., & Manimegalai, P. (2017). Content arrangement characteristic based encryption in cloud using public auditing for data management. International Journal of Engineering & Technology, 7(1.1), 30-36. https://doi.org/10.14419/ijet.v7i1.1.8918