Cloud auditing and authentication scheme for establishing privacy preservation

被引:2
|
作者
Bingu, Rajesh [1 ]
Jothilakshmi, S. [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522302, Andhra Pradesh, India
[2] Annamalai Univ, Dept Informat Technol, Chidambaram 608002, Tamil Nadu, India
关键词
Cloud storage; Auditing; Authentication; Duplication; Data integrity; PROTOCOL; ACCESS;
D O I
10.1007/s11042-023-17170-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing to cloud servers is increased with the development of cloud storage. While increasing the amount of cloud storage, it leads to data duplication. But the unique copy of the original data is stored in the cloud server, and it causes data loss in terms of corruption or missing. It is essential to maintain the duplicate copy of the file and integrity auditing in the field of academic and industrial. The file over the cloud is maintained in a secure or protected manner. This paper proposes cloud auditing with secure file maintenance to retain the duplicate copy of the encrypted file. During the process of public auditing, integrity is maintained for each copy with reduced storage. Secure Authentication with User Anonymity (SAUS) is established with cloud auditing and confidentiality during the process of duplication, and auditing integrity is maintained with encryption approaches. The duplication process is invoked with Multi-Failure Resilient Replication (MRR) procedure in which the data loss is reduced. In order to deal with the multiple auditing strategy for outsourced data, data integrity is maintained with each data owner and delegating third party auditing (TPA) independently. The proposed work is implemented in MATLAB environment with better security and improved performance. The performance of the proposed work is compared with the existing approaches, which shows a better trade-off in contrast to prevailing approaches.
引用
收藏
页码:43849 / 43870
页数:22
相关论文
共 50 条
  • [21] Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment
    Chiou, Shin-Yan
    Ying, Zhaoqin
    Liu, Junqiang
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (04) : 1 - 15
  • [22] Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs
    Sahoo, Shreeya Swagatika
    Mohanty, Sujata
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1037 - 1042
  • [23] Security Enhancement on an Authentication Scheme for Privacy Preservation in Ubiquitous Healthcare System
    Mao, Kefei
    Chen, Jie
    Liu, Jianwei
    Wang, Mengmeng
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 885 - 892
  • [24] An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications
    Sun, Yipin
    Lu, Rongxing
    Lin, Xiaodong
    Shen, Xuemin
    Su, Jinshu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2010, 59 (07) : 3589 - 3603
  • [25] Performance analysis of privacy preservation-based authentication scheme and cryptographic-based data protocols for DSaC in cloud
    Pawar, Ankush Balaram
    Ghumbre, Shashikant U.
    Jogdand, Rashmi M.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 298 - 322
  • [26] Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability
    Yang, Xiaodong
    Wang, Meiding
    Li, Ting
    Liu, Rui
    Wang, Caifen
    IEEE ACCESS, 2020, 8 : 130866 - 130877
  • [27] User stateless privacy-preserving TPA auditing scheme for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    Qiu, Tie
    Ning, Huansheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 : 62 - 70
  • [28] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [29] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [30] A Novel Preserving Client Privacy and Designate Verifier Auditing Scheme for Cloud Storage
    Xu, Jiang
    Chen, Wenliang
    Ji, Sai
    Ren, Yongjun
    Wang, Jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 295 - 304