Hybrid-New Type- Based Proxy Re-Encryption (H-TBPRE) Technique to Ensure Data Integrity in Cloud Computing

© 2020 by IJCTT Journal
Volume-68 Issue-5
Year of Publication : 2020
Authors : Ankit Chamoli, Anshika Garg
DOI :  10.14445/22312803/IJCTT-V68I5P106

How to Cite?

Ankit Chamoli, Anshika Garg, "Hybrid-New Type- Based Proxy Re-Encryption (H-TBPRE) Technique to Ensure Data Integrity in Cloud Computing," International Journal of Computer Trends and Technology, vol. 68, no. 5, pp. 18-23, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I5P106

Cloud computing gives shared pool of assets (computers resources like networks, server and storage) on the demand of the user in ubiquitous and simple way that can be provisioned to the user with a very little management effort. The basic concept of cloud computing can be understood by the following definition according to NIST. It can be concluded from the above discussions that the demands required by the user are fulfilled by the cloud computing. These demands include both hardware and software resources which are present on the internet. A shared pool of resources is provided by the cloud computing provider which can be accessed by the users as per their demands. The users subscribe as per their requirements and access the resources until it wants to. Virtualization is the technique which helps in providing such services and also in reducing the cost of implementation and also adding hardware parts which will help in meeting the requirements of the user. The TBPRE and Proposed H-TBPRE are the techniques which ensure the data integrity.

TBPRE, H-TBPRE, Data Integrity, Cloud.

[1] Ravi Jhawar, Vincenzo Piuri, and Marco Santambrogio,? Fault Tolerance Management in Cloud Computing: A System-Level Perspective?, 2012, IEEE, 1932-8184
[2] Deepak Poola, Kotagiri Ramamohanarao, and Rajkumar Buyya,” Fault-Tolerant Workflow Scheduling Using Spot Instances on Clouds?, 2014, ICCS, Volume 29, Pages 523–533
[3] Sultan Aldossary, William Allen, ?Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions?, (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, pp. 485-492, 2016.
[4] Saranya Eswaran, Dr. Sunitha Abburu, ?Identifying Data Integrity in the Cloud Storage?, IJCSI International Journal of Computer Science Issues, vol. 9, pp. 403-408, 2012.
[5] Gaurav Pachauri, Subhash Chand Gupta, ?ENSURING DATA INTEGRITY IN CLOUD DATA STORAGE?, IJCSNS International Journal of Computer Science and Network Security, vol. 14, pp. 34-38, 2014.
[6] S. P. Jaikar, M. V. Nimbalkar, ?Verifying Data Integrity in Cloud?, International Journal of Applied Information Systems (IJAIS), vol. 3, pp. 38-46, 2012.
[7] Mahalingam, Nandhalakshmi Nithya, ?Efficient Load Balancing in Cloud Computing Using Weighted Throttled Algorithm?, International Journal of Innovative Research in Computer and Communication Engineering , 2015,vol.3, 5409 – 5415.
[8] Rajat Saxena and Somnath Dey, ?Cloud Audit: A Data Integrity Verification Approach for Cloud Computing?, 2016, Procedia Computer Science 89 142 – 151.
[9] Akanksha Bansal, Arun Agrawal, ?Providing Security ,Integrity and Authentication Using ECC Algorithm in cloud storage?, 2017 International Conference on Computer Communication and Informatics (ICCCI -2017).
[10] Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang, “One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage?, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[11] Andrey N. Rukavitsyn, Konstantin A. Borisenko, Ivan I. Holod, Andrey V. Shorov, ?The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing?, 2017, IEEE.
[12] Ankit Chamoli, Anshika Goyal , 2018 ?Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing? International Journal of Computer Sciences and Engineering (IJCSE) Vol.-6, Issue-5, May 2018, E-ISSN: 2347-2693.