Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview

Authors

  • Manimegalai R Department of Computer Science,Rathinam College of Arts and Science,Coimbatore-
  • Priyadharshini A Department of Computer Science,Rathinam College of Arts and Science,Coimbatore-

DOI:

https://doi.org/10.26438/ijcse/v6i5.532534

Keywords:

CP-ABE, ABS, XACML

Abstract

Cloud computing is an Internet-based computing pattern through which shared resources are provided to devices on demand. In order to provide safe and secure operation propose a hierarchical attribute based access control scheme by extending cipher text-policy attribute-based encryption (CP-ABE) with a hierarchical structure of multi authorities and exploiting attribute-based signature (ABS). The proposed scheme not only achieves scalability due to its hierarchical structure, but also inherits fine-grained access control with authentication in supporting write privilege on outsourced data in cloud computing. In addition, we decouple the task of policy management from security enforcement by using the extensible access control markup language (XACML) framework. Extensive analysis shows that our scheme is both efficient and scalable in dealing with access control for out- sourced data in cloud computing.

References

https://apprenda.com/library/cloud/introduction-to-cloud-computing/

https://www.hindawi.com/journals/scn/2017/2713595/

https://eprint.iacr.org/2014/612.pdf

R. Nallakumar, N. Sengottaiyan, S. Nithya, “A Survey of Task Scheduling Methods in Cloud Computing”, International Journal of Computer Sciences and Engineering, Vol.2, Issue.10, pp.9-13, 2014. https://www.hindawi.com/journals/scn/2017/2713595/

S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.

B.P. Rimal, Choi Eunmi, I. Lumb, “A Taxonomy and Survey of Cloud Computing Systems”, Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218

B. R. Kandukuri, R. Paturi V, A. Rakshit, “Cloud Security Issues”, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009. K. Elissa, “Title of paper if known,” unpublished.

Cloud Computing. Wikipdia. Available at http://en.wikipedia.org/wiki/Cloud_computing

Cong Wang, Qian Wang, KuiRen, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing,” 17th International workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4

C. Weinhardt, A. Anandasivam, B. Blau, and J. Stosser.”Business Models in the Service World.”IT Professional, vol. 11, pp. 28-33, 2009.

B. Patel, S. Patel, “Various Load Balancing Algorithms in cloud computing”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol¬.1, Issue.¬2 pp.23-29, 2015.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.532534
Published: 2025-11-13

How to Cite

[1]
R. Manimegalai and A. Priyadharshini, “Privacy Preserving Public Auditing with Data Storage Security in Cloud Computing : An Overview”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 532–534, Nov. 2025.

Issue

Section

Review Article