Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study

Authors

  • Raju CA Dept. of MCA, Sree Vidyanikethan Institute of Management, Tirupati, Andhra Pradesh, India

Keywords:

Cloud storage, information outsourcing, Proof of storage, Remote integrity proof, Public auditing

Abstract

Cloud storage system provides helpful file storage and sharing services for distributed purchasers. to handle integrity, manageable outsourcing and origin auditing issues on outsourced files, we have a tendency to propose Associate in Nursing identity-based information outsourcing (IBDO) theme equipped with fascinating options advantageous over existing proposals in securing outsourced information. First, our IBDO theme permits a user to authorize dedicated proxies to transfer information to the cloud storage server on her behalf, e.g., an organization could authorize some staff to transfer files to the company’s cloud account in an exceedingly controlled means. The proxies area unit known and approved with their recognizable identities, that eliminates difficult certificate management in usual secure distributed computing systems. Second, our IBDO theme facilitates comprehensive auditing, i.e., our theme not solely permits regular integrity auditing as in existing schemes for securing outsourced information, however conjointly permits to audit {the information|the knowledge|the information} on data origin, kind and consistence of outsourced files. Security analysis and experimental analysis indicate that our IBDO theme provides robust security with fascinating potency.

References

[1] D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud information protection for the plenty,” Computer, IEEE, vol. 45, no. 1, pp. 39–45, Jan 2012.

[2] C.-K. Chu, W.-T. Zhu, J. Han, J. Liu, J. Xu, and J. Zhou, “Security issues in widespread cloud storage services,” Pervasive Computing, IEEE, vol. 12, no. 4, pp. 50–57, Oct 2013.

[3] K. Yang and X. Jia, “Data storage auditing service in cloud com- puting: challenges, strategies and opportunities.

[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Pe- terson, and D. Song, “Provable information Possession at Untrusted Stores,” in Proceedings of the fourteenth ACM Conference on laptop and Communications Security. New York, NY, USA: ACM, 2007, pp. 598–609.

[5] J. Sun and Y. Fang, “Cross-Domain information Sharing in Distributed Electronic Health Record Systems,” Parallel and Distributed System- s, IEEE Transactions on, vol. 21, no. 6, pp. 754–764, 2010.

[6] J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryptography based mostly Secure EHR System for Patient Privacy and Emergency care,” in Distributed Computing Systems (ICDCS), 2011 IEEE thirty first International Conference on. IEEE, 2011, pp. 373–382.

Downloads

Published

2025-11-25

How to Cite

[1]
C. A. Raju, “Identity-Based information Outsourcing with Comprehensive Auditing in Clouds: A Study”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 109–115, Nov. 2025.