Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing
DOI:
https://doi.org/10.26438/ijcse/v6i5.11231128Keywords:
Mobile cloud computing, secure data distribution,, data integrity, access control, proxy re-encryption.Abstract
Cloud computing gives shared pool of assets (computers resources like networks, server and storage) on the demand of the user in ubiquitous and simple way that can be provisioned to the user with a very little management effort. The basic concept of cloud computing can be understood by the following definition according to NIST. It can be concluded from the above discussions that the demands required by the user are fulfilled by the cloud computing. These demands include both hardware and software resources which are present on the internet. A shared pool of resources is provided by the cloud computing provider which can be accessed by the users as per their demands. The users subscribe as per their requirements and access the resources until it wants to. Virtualization is the technique which helps in providing such services and also in reducing the cost of implementation and also adding hardware parts which will help in meeting the requirements of the user. The PDPT and NTBPRET are the techniques which ensure the data integrity.
References
Shui Han, Jianchuan Xing, “Ensuring Data Storage Through A Novel Third Party Auditor Scheme in Cloud Computing” , 2011, IEEE computer science & Technology, pp 264-268.
Bhavna Makhija, VinitKumar Gupta, “Enhanced Data Security in Cloud Computing with Third Party Auditor”, 2013, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345
Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, pp. 485-492, 2016.
Saranya Eswaran, Dr. Sunitha Abburu, “Identifying Data Integrity in the Cloud Storage”, IJCSI International Journal of Computer Science Issues, vol. 9, pp. 403-408, 2012.
Gaurav Pachauri, Subhash Chand Gupta, “ENSURING DATA INTEGRITY IN CLOUD DATA STORAGE”, IJCSNS International Journal of Computer Science and Network Security, vol. 14, pp. 34-38, 2014.
S. P. Jaikar, M. V. Nimbalkar, “Verifying Data Integrity in Cloud”, International Journal of Applied Information Systems (IJAIS), vol. 3, pp. 38-46, 2012.
Anchal Srivastava, Ashutosh sehgal, Vikas Kumar Singh, Nitish Kumar Bose, “Provable data possession for integrity verification”, 2014, International Refereed Journal of Engineering and Science (IRJES), Volume 3, Issue 4
Preeti Siroh and Amit Agarwal, “Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust”, 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015)
Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang, “One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage”, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications
Andrey N. Rukavitsyn, Konstantin A. Borisenko, Ivan I. Holod, Andrey V. Shorov, “The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing”, 2017, IEEE
G. Ateniese, R. D. Pietro, L. V. Mancini, G. Tsudik, “Scalable and Efficient Provable Data Possession”, in Proceedings of SecureComm, vol. 2, pp. 23-28, 2008.
Benoˆıt Libert and Damien Vergnaud. Unidirectional chosenciphertext secure proxy re-encryption. Information Theory, IEEE Transactions on, 57(3):1786 –1802, march 2011.
Qiang Tang. Type-based proxy re-encryption and its construction. In DipanwitaRoy Chowdhury, Vincent Rijmen, and Abhijit Das,editors, Progress in Cryptology - INDOCRYPT 2008, volume 5365 of Lecture Notes in Computer Science, pages 130–144. Springer Berlin Heidelberg, 2008.
Parsi, K., & M.Laharika, “A Comparative Study of Different Deployment Models in a Cloud”, 2013, International Journal of Advanced Research in Computer Science and Software Engineering , 3 (5), 512-515.
Srinivas.J, K. Venkata Subba Reddy, Dr. A. Moiz Qyser, “Cloud Computing Basics”, 2012, International journal of advanced research in computer and communication engineering , pp. 343-347
Seyyed Mansur Hosseini and Mostafa Ghobaei Arani,” Fault-Tolerance Techniques in Cloud Storage: A Survey”, 2015, International Journal of Database Theory and Application, Vol.8, No.4 (2015), pp.183-190
SookKyong Choi, KwangSik Chung, Heonchang Yu,” Fault tolerance and QoS scheduling using CAN in mobile social cloud computing”, 2013, Springer Science+Business Media New York
Dr. Lakshmi Prasad Saikia, Yumnam Langlen Devi,” FAULT TOLEREANE TECHNIQUES AND ALGORITHMS IN CLOUD COMPUTING”, International Journal of Computer Science & Communication Networks, Vol 4(1),01-08
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, “Provable Data Possession at Untrusted Stores”, in Proceedings of 14th ACM Conf. Computer and Comm, Security (CCS ’07), vol. 5, pp. 231-238, 2007.
MS. R. K. Pandya, prof. K. K. Sutaria, “Data integrity techniques in cloud: an analysis”, journal of information, knowledge and research in computer engineering”, vol. 2, pp. 413-417, 2012.
Soumya Ray and Ajanta De Sarkar, “Execution Analysis of Load Balancing Algorithm in Cloud computing Environment”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.5, October 2012
Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
Tushar Desai, Jignesh Prajapati, “A Survey of Various Load Balancing Techniques and Challenges in Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 11, NOVEMBER 2013
Vimmi Pandey, “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4, 2013
Anandita Singh Thakur, P.K. Gupta, and Punit Gupta, “Handling Data Integrity Issue in SaaS Cloud”, 2014, Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 127– Vol. 2, Advances in Intelligent Systems and Computing
Jiang Zhang, Zhenfeng Zhang, Hui Guo. "Towards Secure Data Distribution Systems in Mobile Cloud Computing", IEEE Transactions on Mobile Computing, 2017
RezaOsamaRandal CurtmolaKhanBurns. "Robust remote data checking", Proceedings of the 4th ACM international workshop on Storage security and survivability - StorageSS 08 StorageSS 08, 2008
ZHU, YAN, SHANBIAO WANG, HONGXIN HU, GAIL-JOON AHN, and DI MA. "SECURE COLLABORATIVE INTEGRITY VERIFICATION FOR HYBRID CLOUD ENVIRONMENTS", International Journal of Cooperative Information Systems, 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
