Improving Cloud Storage Security using Public-Key Based Homomorphic linear authenticator (HLA) and Threshold Cryptography

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-29 Number-2
Year of Publication : 2015
Authors : Reshma Suryawanshi, S.N.Shelke
  10.14445/22312803/IJCTT-V29P116

MLA

Reshma Suryawanshi, S.N.Shelke "Improving Cloud Storage Security using Public-Key Based Homomorphic linear authenticator (HLA) and Threshold Cryptography". International Journal of Computer Trends and Technology (IJCTT) V29(2):87-91, November 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The use of cloud computing in many organizations is increasing rapidly. Cloud computing has gain its popularity due to its advantages like cost reduction, greater flexibility, elasticity and optimal resource utilization. Besides all the benefits of the cloud computing security of the stored data need to be considered while storing sensitive data on cloud. Cloud users cannot rely only on cloud service provider in concern of security of their sensitive data. For that purpose in this paper we are proposing two schemes in first scheme we are proposing a public auditor which will check security of sensitive data stored on cloud servers. That is we are providing a technique of Third Party Auditor (TPA) to check integrity of data stored on cloud for data owner. Using TPA, the public auditing process does not bring new vulnerabilities towards user data privacy, and does not impose an additional online burden to user. In second scheme we are proposing a threshold cryptography technique in which data owner divides users in groups and gives single key to each user group for decryption of data and, each user in the group shares parts of the key so as to achieve high data confidentiality.

References
[1] Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau, ―Efficient audit service outsourcing for data integrity in clouds, The Journal of Systems and Software 85 (2012) 1083– 1095.
[2] Wang Shao-hui, Chang Su-qin, Chen Dan-wei, Wang Zhi-wei, ―Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy.
[3] Anthony Bisong, Syed (Shawon) M. Rahman, ―An Overview of the Security Concerns in Enterprise Cloud Computing, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011.
[4] Mehul A. Shah, Ram Swaminathan, Mary Baker, ―Privacy- Preserving Audit and extraction of Digital Contents, HP Laboratories, Palo Alto HPL-2008-32R1 April 30, 2008*
[5] Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, Wenjing Lou, ―Privacy-Preserving Public Auditing for Secure Cloud Storage, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013
[6] Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom, ―Cloud Computing Security: From Single to Multi- Clouds, 2012 45th Hawaii International Conference on System Sciences.
[7] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, ―Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
[8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007.
[9] Kevin D. Bowers, Ari Juels, Alina Oprea, ―Proofs of Retrievability: Theory and Implementation, CCSW’09, November 13, 2009, Chicago, Illinois, USA. Copyright 2009 ACM 978-1-60558-784-4/09/11.
[10] A. Juels and J. Burton, S. Kaliski, ―PORs: Proofs of Retrievability for Large Files, Proc. ACM Conf. Computer and Comm. Security(CCS ’07), pp. 584-597, Oct. 2007.
[11] Y. Dodis, S.P. Vadhan, and D. Wichs, ―Proofs of Retrievability via Hardness Amplification, Proc. Theory of Cryptography Conf. Theory of Cryptography (TCC), pp. 109-127, 2009.
[12] H. Shacham and B. Waters, ―Compact Proofs of Retrievability, Proc. Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (Asiacrypt), vol. 5350, pp. 90-107, Dec. 2008
[13] C. Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassi, ―Dynamic Provable Data Possession, CCS’09, November 9–13, 2009, Chicago, Illinois, USA. Copyright 2009 ACM 978-1-60558-352-5/09/11
[14] M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, ―Auditing to Keep Online Storage Services Honest, Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS ’07), pp. 1-6, 2007.
[15] Imran Ahmad, Hitesh Gupta, ―Privacy-Preserving Public Auditing & Data Intrgrity for Secure Cloud Storage, International Conference on Cloud, Big Data and Trust 2013, Nov 13-15, RGPV.
[16] Sushil Kr Saroj, Sanjeev Kr Chauhan, Aravendra Kr Sharma, Sundaram Vats, ―Threshold Cryptography Based Data Security in Cloud Computing, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.
[17] Saripalli P and Walters 8., "QUIRC: A Quantitative impact and Risk assessment framework for Cloud Security", IEEE 3rd International Conference on Cloud Computing, 20 10.
[18] H. Zhong, and H. Zhen, ―An Efficient Authenticated Group Key Agreement Protocol," Security Technology, 2007 41st Annual IEEE International Carnahan Conference on, vol., no., pp.250-254, 8-11 Oct. 2007.
[19] S. Sanka, C. Hota, and M. Rajarajan, ―Secure data access in cloud computing," Internet Multimedia Services Architecture and application (IMSAA), 2010 IEEE 4th International Conference on, vol., no., pp.1-6, 15-17 Dec. 2010.

Keywords
Cloud Computing, Cloud Storage, Data Integrity, Third party auditor, threshold cryptography, key.