Secured Data on Cloud Environment by SAPA Protocol with Auto-renewal

Authors

  • Prashanthi K B.Tech Student(CSE), Bharath University, Chennai-73
  • Sangamithirai P B.Tech Student(CSE), Bharath University, Chennai-73
  • Pothumani S Assistant Professor, Dept of CSE, Bharath University, Chennai-73

Keywords:

Knowledge Obstrucity, Forward Security, Universal Composability

Abstract

Cloud computing is rising as a rife knowledge interactive paradigm to understand users’ knowledge remotely hold on in a web cloud server. Cloud services offer nice conveniences for the users to relish the on-demand cloud applications while not c Knowledge Obstrucity, Forward Security, Universal Composability onsidering the native infrastructure limitations. Throughout the information accessing, completely different users could also be in a very cooperative relationship, and so knowledge sharing becomes vital to attain productive edges. The prevailing security solutions chiefly concentrate on the authentication to understand that a user’s privative knowledge cannot be unauthorized accessed, however neglect a delicate privacy issue throughout a user.It is difficult for the cloud server to request different users for knowledge sharing. The challenged access request itself might reveal the user’s privacy in spite of whether or not it will acquire the information access permissions. During this paper, we have a tendency to propose a shared authority primarily based privacy-preserving authentication protocol (SAPA) to deal with higher than privacy issue for cloud storage. Within the SAPA, 1) shared access authority is achieved by anonymous access request matching mechanism with security and privacy concerns (e.g., authentication, knowledge obscurity, user privacy, and forward security); 2) attribute primarily based access management is adopted to understand that the user will solely access its own knowledge fields; 3) proxy re-encryption is applied by the cloud server to supply knowledge sharing among the multiple users. Meanwhile, universal compos ability (UC) model is established to prove that the SAPA on paper has the planning correctness. It indicates that the projected protocol realizing privacy-preserving knowledge access authority sharing is enticing for multi-user cooperative cloud applications.

References

P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” National Institute of Standards and Technology,USA, 2009.

A. Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,” IEEE Communications Magazine, vol. 50, no. 9, pp, 24-25, 2012.

R. Moreno-Vozmediano, R. S. Montero, and I. M. Llorente,“Key Challenges in Cloud Computing to Enable the Future Internet of Services,” IEEE Internet Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6203493, 2012.

K. Hwang and D. Li, “Trusted Cloud Computing with Secure Resources and Data Coloring,” IEEE Internet Computing, vol. 14,no. 5, pp. 14-22, 2010.

J. Chen, Y. Wang, and X. Wang, “On-Demand Security Architecture for Cloud Computing,” Computer, vol. 45, no. 7, pp. 73-78,2012.

Y. Zhu, H. Hu, G. Ahn, and M. Yu, “Cooperative Provable Data Possession for Integrity Verification in Multi-cloud Storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no, 12, pp. 2231-2244, 2012.

H. Wang, “Proxy Provable Data Possession in Public Cloud-s,” IEEE Transactions on Services Computing, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6357 181, 2012.

K. Yang and X. Jia, “An Efficient and Secure Dynamic Au-diting Protocol for Data Storage in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6311 398, 2012.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.

C. Wang, K. Ren, W. Lou, J, Lou,“Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network, vol. 24, no. 4, pp. 19-24, 2010.

L. A. Dunning and R. Kresman, “Privacy Preserving Data Sharing With Anonymous ID Assignment,” IEEE Transactions on Information

Forensics and Security, vol. 8, no. 2, pp. 402-413, 2013.

X. Liu, Y. Zhang, B. Wang, and J. Yan, “Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud,” IEEE Transactions

on Parallel and Distributed Systems, [online] ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6374-615, 2012.

Downloads

Published

2024-02-26

How to Cite

Prashanthi, K., Sangamithirai, P., & Pothumani, S. (2024). Secured Data on Cloud Environment by SAPA Protocol with Auto-renewal. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(04), 1619–1623. Retrieved from https://ijact.in/index.php/j/article/view/283

Issue

Section

Review Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.