Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study
Keywords:
Cloud storage, information outsourcing, Proof of storage, Remote integrity proof, Public auditingAbstract
Cloud storage system provides helpful file storage and sharing services for distributed purchasers. to handle integrity, manageable outsourcing and origin auditing issues on outsourced files, we have a tendency to propose Associate in Nursing identity-based information outsourcing (IBDO) theme equipped with fascinating options advantageous over existing proposals in securing outsourced information. First, our IBDO theme permits a user to authorize dedicated proxies to transfer information to the cloud storage server on her behalf, e.g., an organization could authorize some staff to transfer files to the company’s cloud account in an exceedingly controlled means. The proxies area unit known and approved with their recognizable identities, that eliminates difficult certificate management in usual secure distributed computing systems. Second, our IBDO theme facilitates comprehensive auditing, i.e., our theme not solely permits regular integrity auditing as in existing schemes for securing outsourced information, however conjointly permits to audit {the information|the knowledge|the information} on data origin, kind and consistence of outsourced files. Security analysis and experimental analysis indicate that our IBDO theme provides robust security with fascinating potency.
References
[1] D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud information protection for the plenty,” Computer, IEEE, vol. 45, no. 1, pp. 39–45, Jan 2012.
[2] C.-K. Chu, W.-T. Zhu, J. Han, J. Liu, J. Xu, and J. Zhou, “Security issues in widespread cloud storage services,” Pervasive Computing, IEEE, vol. 12, no. 4, pp. 50–57, Oct 2013.
[3] K. Yang and X. Jia, “Data storage auditing service in cloud com- puting: challenges, strategies and opportunities.
[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Pe- terson, and D. Song, “Provable information Possession at Untrusted Stores,” in Proceedings of the fourteenth ACM Conference on laptop and Communications Security. New York, NY, USA: ACM, 2007, pp. 598–609.
[5] J. Sun and Y. Fang, “Cross-Domain information Sharing in Distributed Electronic Health Record Systems,” Parallel and Distributed System- s, IEEE Transactions on, vol. 21, no. 6, pp. 754–764, 2010.
[6] J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryptography based mostly Secure EHR System for Patient Privacy and Emergency care,” in Distributed Computing Systems (ICDCS), 2011 IEEE thirty first International Conference on. IEEE, 2011, pp. 373–382.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
