Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model

被引:0
|
作者
Kumar R.P. [1 ]
Bandanadam S.R. [1 ]
机构
[1] Department of Computer Science and Engineering (AIE), Amrita School of Computing, Amrita Vishwa Vidyapeetham, Tamil Nadu, Chennai
关键词
Adaptive position-based arithmetic with sunflower optimization algorithm; Blockchain technology; Improved EI-GAMAL; Public auditing for cloud storage;
D O I
10.1007/s41870-023-01599-8
中图分类号
学科分类号
摘要
With the growing relevance of data integrity, public auditing mechanisms for cloud storage models are intensively researched. In public auditing systems, a third person is used to ensure the outsourced data’s integrity on the user’s behalf. A lot of public verification models regarding blockchain are developed to combat cruel trusted Third Public Auditors (TPAs). Conventional models for auditing are based on TPA and are prone to an auditor enticing who colludes with the hostile block-chain to provide prejudiced results for auditing. This research work plans to propose a blockchain-based public auditing scheme to verify data integrity in cloud storage. The first people upload the data to the cloud and retrieve the data when they need it. The data must be encrypted and private among the second people and DO, since both DO and the second person do not believe each other. Therefore, the DO encrypts his/her data using the Improved EI-GAMAL (IEI-GAMAL) encryption algorithm and uploads the encrypted data to the Cloud Service Provider (CSP) via the blocks of the blockchain. For preserving the privacy of the data, the key for data encryption as well as decryption is generated using the new hybrid optimization model. The DO selects one TPA to audit the data on behalf of the DO. Generally, a TPA concentrates the data of numerous DOs and offers the audit for DOs. The DO requests a public audition to generate proof of the encrypted block stored in the blockchain when he requires verifying the data present in cloud storage. In order to provide strong updates and lessen the computation expenses, the new hybrid optimization algorithm is used. The new hybrid algorithm is the theoretical unify of the Adaptive Position-based Arithmetic with the Sunflower Optimization Algorithm (APA-SFOA). Several investigations are executed to prove the supremacy of the developed model. © The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
引用
收藏
页码:697 / 711
页数:14
相关论文
共 50 条
  • [41] Enabling identity-based cloud storage public auditing with quantum computers resistance
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (01) : 82 - 98
  • [42] BB-tree based secure and dynamic public auditing convergence for cloud storage
    Mishra, Rahul
    Ramesh, Dharavath
    Edla, Damodar Reddy
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4917 - 4956
  • [43] Public Data Integrity Auditing Scheme Based on Fuzzy Identity for Cloud Storage System
    Yuan, Yilin
    Gu, Yifan
    Zhang, Zhenzhen
    International Journal of Network Security, 2023, 25 (04) : 609 - 619
  • [44] BB-tree based secure and dynamic public auditing convergence for cloud storage
    Rahul Mishra
    Dharavath Ramesh
    Damodar Reddy Edla
    The Journal of Supercomputing, 2021, 77 : 4917 - 4956
  • [45] Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Jian
    Huang, Kun
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1513 - 1528
  • [46] Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage
    Chaudhari, Smita
    Swain, Gandharba
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 472 - 481
  • [47] Certificate-Based Proxy Re-Encryption for Public Cloud Storage
    Sur, Chul
    Park, Youngho
    Shin, Sang Uk
    Rhee, Kyung Hyune
    Seo, Changho
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 159 - 166
  • [48] Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage
    Wang, Feng
    Xu, Li
    Choo, Kim-Kwang Raymond
    Zhang, Yuexin
    Wang, Huaqun
    Li, Jiguo
    IEEE ACCESS, 2020, 8 : 2258 - 2271
  • [49] Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
    Luo, Hong-Shan
    Jiang, Rui
    Pei, Bei
    2017 10TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL. 1, 2017, : 33 - 36
  • [50] Lattice-Based Efficient Certificateless Public Auditing Scheme from RLWE for Cloud Storage
    Cheeturi, Renuka
    Pasupuleti, Syam Kumar
    Rout, Rashmi Ranjan
    2024 IEEE 24TH INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW 2024, 2024, : 26 - 33