Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model

被引:0
|
作者
Kumar R.P. [1 ]
Bandanadam S.R. [1 ]
机构
[1] Department of Computer Science and Engineering (AIE), Amrita School of Computing, Amrita Vishwa Vidyapeetham, Tamil Nadu, Chennai
关键词
Adaptive position-based arithmetic with sunflower optimization algorithm; Blockchain technology; Improved EI-GAMAL; Public auditing for cloud storage;
D O I
10.1007/s41870-023-01599-8
中图分类号
学科分类号
摘要
With the growing relevance of data integrity, public auditing mechanisms for cloud storage models are intensively researched. In public auditing systems, a third person is used to ensure the outsourced data’s integrity on the user’s behalf. A lot of public verification models regarding blockchain are developed to combat cruel trusted Third Public Auditors (TPAs). Conventional models for auditing are based on TPA and are prone to an auditor enticing who colludes with the hostile block-chain to provide prejudiced results for auditing. This research work plans to propose a blockchain-based public auditing scheme to verify data integrity in cloud storage. The first people upload the data to the cloud and retrieve the data when they need it. The data must be encrypted and private among the second people and DO, since both DO and the second person do not believe each other. Therefore, the DO encrypts his/her data using the Improved EI-GAMAL (IEI-GAMAL) encryption algorithm and uploads the encrypted data to the Cloud Service Provider (CSP) via the blocks of the blockchain. For preserving the privacy of the data, the key for data encryption as well as decryption is generated using the new hybrid optimization model. The DO selects one TPA to audit the data on behalf of the DO. Generally, a TPA concentrates the data of numerous DOs and offers the audit for DOs. The DO requests a public audition to generate proof of the encrypted block stored in the blockchain when he requires verifying the data present in cloud storage. In order to provide strong updates and lessen the computation expenses, the new hybrid optimization algorithm is used. The new hybrid algorithm is the theoretical unify of the Adaptive Position-based Arithmetic with the Sunflower Optimization Algorithm (APA-SFOA). Several investigations are executed to prove the supremacy of the developed model. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
引用
收藏
页码:697 / 711
页数:14
相关论文
共 50 条
  • [21] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [22] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [23] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Xiehua Li
    Yanlong Wang
    Ming Xu
    Yaping Cui
    中国通信, 2018, 15 (02) : 138 - 152
  • [24] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [25] Efficient ID-based public auditing for the outsourced data in cloud storage
    Zhang, Jianhong
    Dong, Qiaocui
    INFORMATION SCIENCES, 2016, 343 : 1 - 14
  • [26] New public auditing protocol based on homomorphic tags for secure cloud storage
    Zhang, Jindan
    Wang, Baocang
    Ogiela, Marek R.
    Wang, Xu An
    Sangaiah, Arun Kumar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [27] Dynamic proof of retrievability based on public auditing for coded secure cloud storage
    El Balmany, Chawki
    Asimi, Ahmed
    Bamarouf, Mohamed
    Tbatou, Zakariae
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (27) : 39229 - 39249
  • [28] Dynamic proof of retrievability based on public auditing for coded secure cloud storage
    Chawki El Balmany
    Ahmed Asimi
    Mohamed Bamarouf
    Zakariae Tbatou
    Multimedia Tools and Applications, 2022, 81 : 39229 - 39249
  • [29] Blockchain-based public auditing with deep reinforcement learning for cloud storage
    Li, Jiaxing
    Wu, Jigang
    Jiang, Lin
    Li, Jin
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 242
  • [30] Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
    Tian, Hui
    Chen, Yuxiang
    Chang, Chin-Chen
    Jiang, Hong
    Huang, Yongfeng
    Chen, Yonghong
    Liu, Jin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 701 - 714