Open Access   Article Go Back

Enabling Efficient Consumer Revocation for Identity based Cloud Storage Auditing for Shared Big Data Records

Ayushi P Bohara1 , Chethan A2 , Haripriya B3 , Harshitha V4 , Arun Biradar5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 21-26, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.2126

Online published on May 16, 2019

Copyright © Ayushi P Bohara, Chethan A, Haripriya B, Harshitha V, Arun Biradar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ayushi P Bohara, Chethan A, Haripriya B, Harshitha V, Arun Biradar, “Enabling Efficient Consumer Revocation for Identity based Cloud Storage Auditing for Shared Big Data Records,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.21-26, 2019.

MLA Style Citation: Ayushi P Bohara, Chethan A, Haripriya B, Harshitha V, Arun Biradar "Enabling Efficient Consumer Revocation for Identity based Cloud Storage Auditing for Shared Big Data Records." International Journal of Computer Sciences and Engineering 07.15 (2019): 21-26.

APA Style Citation: Ayushi P Bohara, Chethan A, Haripriya B, Harshitha V, Arun Biradar, (2019). Enabling Efficient Consumer Revocation for Identity based Cloud Storage Auditing for Shared Big Data Records. International Journal of Computer Sciences and Engineering, 07(15), 21-26.

BibTex Style Citation:
@article{Bohara_2019,
author = {Ayushi P Bohara, Chethan A, Haripriya B, Harshitha V, Arun Biradar},
title = {Enabling Efficient Consumer Revocation for Identity based Cloud Storage Auditing for Shared Big Data Records},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {21-26},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1194},
doi = {https://doi.org/10.26438/ijcse/v7i15.2126}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.2126}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1194
TI - Enabling Efficient Consumer Revocation for Identity based Cloud Storage Auditing for Shared Big Data Records
T2 - International Journal of Computer Sciences and Engineering
AU - Ayushi P Bohara, Chethan A, Haripriya B, Harshitha V, Arun Biradar
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 21-26
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud storage auditing schemes for shared facts refer with checking the integrity of cloud facts shared via a collection of customers.User revocation is commonly supported in such schemes, as customers may be issue to organization or may misbehave.Previously, the computational overhead for consumer revocation in such schemes was linear with the entire quantity of document blocks possessed by a revoked consumer. In this paper, we advise a singular storage auditing scheme that achieves consumer revocation unbiased of the full variety of file blocks possessed via the revoked consumer in the cloud. This is carried out through exploring a novel approach for key era and a brand new personal key replace method. By using this approach, we realize consumer revocation via simply updating the non revoked customers’ personal keys rather than authenticators of the revoked consumer. The integrity auditing of the revoked consumer’s data can nonetheless be efficaciously achieved when the authenticators aren`t updated. Meanwhile, the proposed scheme is based totally on identification-base cryptography, which gets rid of the complex certificate control in conventional Public Key Infrastructure (PKI) structures. the safety and efficiency of the proposed scheme are confirmed through both evaluation and experimental consequences.

Key-Words / Index Term

Revocation,Key Generation,Cloud Computing

References

[1]. Hui Cui, Robert H Deng, Joseph K Liu, Xui Yi, “ Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices” IEEE Transactions on Industrial Informatics, Volume: 14 , Issue: 8 , Aug. 2018
[2]. Suzuki T, Emura K, Ohigashi T, ”A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage” J Med Syst. 2019 Mar 28, vol 43(5):128.
[3]. Xing Q, Wang B, Wang X, Tao J, “Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters”, 12 Apr 2018, vol 13(4), /journal pone.
[4]. G. Yang, J. Yu, W. Shen, Q. Su, F.Zhang, R Hao ,”Enabling Public Auditing for Shared Data in Cloud Storage Supporting Identity Privacy and Traceability” ,April 2016
[5]. J. Yu, K.Ren, C. Wang,“Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates” , August 2016.
[6]. H. Wang , “Proxy provable data possession in public clouds” , vol. 113, pp. 130-139, 2016.
[7]. J. Yu, K. Ren, C. Wang, V. Varadharajan ,”Enabling cloud storage auditing with key-exposure resistance”, 39(10), 9359–9366, Sept 2018.
[8]. Y. Luo, M. Xu, S. Fu, D. Wang, and J. Deng, “Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation,” IEEE Trust com/Big DataSE /ISPA,pp. 434-442, 2015.
[9]. J. Yu, K. Ren, and C. Wang, “Enabling Cloud StorageAuditing with Verifiable Outsourcing of Key Updates,”IEEE Transactions on Information Forensics and Security, vol. 11, no.5, pp. 1362-1375, 2016.
[10]. J. Yu and H. Wang, “Strong Key-Exposure ResilientAuditing for Secure Cloud Storage,” IEEE Transactionson Information Forensics and Security, vol. 12, no.8, pp.1931-1940, 2017.
[11]. J. Yu, H. Rong, H. Xia, H. Zhang, X. Cheng, and F.Kong, “Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction,” Information Sciences, vol. 442-443, pp. 158-172, 2018.
[12]. J. Yu, R. Hao, H. Zhao, M. Shu, and J. Fan, “IRIBE:Intrusion-resilient identity-based encryption,”InformationSciences, vol. 329, pp. 90-104, 2016.
[13]. W. Shen, G. Yang, J. Yu , H. Zhang, F. Kong, and R. Hao, “Remote data possession checking with privacy-preserving authenticators for cloud storage,” Future Generation Computer Systems, vol. 76, pp. 136-145, 2017.
[14]. F. FatemiMoghaddam, P. Wieder, and R. Yahyapour, “Federated PolicyManagement Engine for Reliable Cloud Computing,” in IEEEInternational Conference on Ubiquitous and Future Networks (ICUFN2017), 2017.
[15]. F. FatemiMoghaddam, P. Wieder, and R. Yahyapour, “PolicyManagement Engine (PME) - A Policy-Based Schema to Classify andManage Sensitive Data in Cloud Storages,” J. Inf. Secur.Appl., vol. 36,pp. 11–19, 2017.
[16]. W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu and R. Hao, “Light-weight and Privacy-preserving Secure Cloud Auditing Scheme for Group Users via the Third Party Medium,” Journal of Network and Computer Applications,vol. 82, pp.56-64, 2017.
[17]. M. Sookhak, A. Gania, M. K. Khanb, and R. Buyyac, “Dynamic Remote Data Auditing for Securing Big Data Storage in Cloud Computing,” Information Science, vol.380, pp. 101-116, 2017.
[18]. L. Rao, H. Zhang, and T. Tu, “Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves- Authenticated Merkle Hash Tree,” IEEE Transactions on Services Computing, Available online 26 May 2017 DOI:10.1109/TSC.2017.2708116.
[19]. J. Yu and H. Wang, “Strong Key-Exposure Resilient Auditing for Secure Cloud Storage,” IEEE Transactions on Information Forensics and Security, vol. 12, no.8, pp. 1931-1940, 2017.