Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model

被引:0
|
作者
Kumar R.P. [1 ]
Bandanadam S.R. [1 ]
机构
[1] Department of Computer Science and Engineering (AIE), Amrita School of Computing, Amrita Vishwa Vidyapeetham, Tamil Nadu, Chennai
关键词
Adaptive position-based arithmetic with sunflower optimization algorithm; Blockchain technology; Improved EI-GAMAL; Public auditing for cloud storage;
D O I
10.1007/s41870-023-01599-8
中图分类号
学科分类号
摘要
With the growing relevance of data integrity, public auditing mechanisms for cloud storage models are intensively researched. In public auditing systems, a third person is used to ensure the outsourced data’s integrity on the user’s behalf. A lot of public verification models regarding blockchain are developed to combat cruel trusted Third Public Auditors (TPAs). Conventional models for auditing are based on TPA and are prone to an auditor enticing who colludes with the hostile block-chain to provide prejudiced results for auditing. This research work plans to propose a blockchain-based public auditing scheme to verify data integrity in cloud storage. The first people upload the data to the cloud and retrieve the data when they need it. The data must be encrypted and private among the second people and DO, since both DO and the second person do not believe each other. Therefore, the DO encrypts his/her data using the Improved EI-GAMAL (IEI-GAMAL) encryption algorithm and uploads the encrypted data to the Cloud Service Provider (CSP) via the blocks of the blockchain. For preserving the privacy of the data, the key for data encryption as well as decryption is generated using the new hybrid optimization model. The DO selects one TPA to audit the data on behalf of the DO. Generally, a TPA concentrates the data of numerous DOs and offers the audit for DOs. The DO requests a public audition to generate proof of the encrypted block stored in the blockchain when he requires verifying the data present in cloud storage. In order to provide strong updates and lessen the computation expenses, the new hybrid optimization algorithm is used. The new hybrid algorithm is the theoretical unify of the Adaptive Position-based Arithmetic with the Sunflower Optimization Algorithm (APA-SFOA). Several investigations are executed to prove the supremacy of the developed model. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
引用
收藏
页码:697 / 711
页数:14
相关论文
共 50 条
  • [31] Hybrid Secure Cloud Storage data based on improved Encryption Scheme
    Deepthi, B.
    Ramani, G.
    Deepika, R.
    Shabbeer, Md
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 776 - 779
  • [32] Public Auditing System: Improved Remote Data Possession Checking Protocol for Secure Cloud Storage
    Rashmi, Patil R.
    Sangve, S. M.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 75 - 80
  • [33] Data Encryption Framework Model with Watermark Security for Data Storage in Public Cloud Model
    Boopathy, D.
    Sundaresan, M.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 903 - 907
  • [34] Secure Public-Auditing Cloud Storage Enabling Data Dynamics in the Standard Model
    Ma, Mingxiao
    Weber, Jos
    van den Berg, Jan
    2016 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING, DATA MINING, AND WIRELESS COMMUNICATIONS (DIPDMWC), 2016, : 170 - 175
  • [35] Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage
    Sandor, Voundi Koe Arthur
    Lin, Yaping
    Li, Xiehua
    Lin, Feng
    Zhang, Shiwen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 : 25 - 36
  • [36] Blockchain-based fair payment smart contract for public cloud storage auditing
    Wang, Hao
    Qin, Hong
    Zhao, Minghao
    Wei, Xiaochao
    Shen, Hua
    Susilo, Willy
    INFORMATION SCIENCES, 2020, 519 : 348 - 362
  • [37] Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
    Tian, Hui
    Peng, Fang
    Quan, Hanyu
    Chang, Chin-Chen
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [38] An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking
    Zhang, Jindan
    Wang, Baocang
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 185 - 199
  • [39] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [40] Pseudo-ID-based public auditing with privacy-preserving for cloud storage
    Liu, Xue-Yan
    He, Xiao-Mei
    Lu, Ting-Ting
    Journal of Computers (Taiwan), 2020, 31 (03) : 154 - 167