Stub Signature-Based Efficient Public Data Auditing System in Cloud Computing Using Holomorphic Algorithm

Authors

  • K. Sreenivasulu M.C.A Student, Department of M.C.A, KMMIP, Tirupati (D.t), Andhra Pradesh, India Author
  • Noortaj Assistant Professor, Department of M.C.A, KMMIP, Tirupati (D.t), Andhra Pradesh, India Author

Keywords:

Homomorphic Encryption Algorithm, Cloud Computing, Data safety, Data Encryption, Data Decryption

Abstract

Online cloud statistics storage is a swiftly growing pillar of the IT industry that offers facts proprietors an array of attractive developments in fantastically sought-after online scalable garage offerings. Cloud customers can easily get admission to those offerings and feature the ability to control their procedure records effectively without disturbing about the deployment or preservation of private storage devices. As a end result, the range of cloud customers has increased to purchase those handy and value-effective services, while Cloud Service Providers also are growing to fulfil this call for attractive cloud solutions. However, there's one predominant security problem associated with outsourced data on shared cloud garage: its privacy and accuracy cannot be assured as it could be at risk of unauthorized get right of entry to via malicious insiders or hackers from out of doors resources. To deal with those problems, we advocate proposing a partial signature-primarily based facts auditing gadget so that both privacy and accuracy can be fortified whilst lowering the computational cost associated with auditing tactics drastically. This gadget could contain the use of cryptographic techniques including homomorphic encryption and hash functions, which could allow secure sharing among more than one parties while making sure integrity tests on saved files at normal intervals for any potential tampering attempts made by way of outside attackers or malicious insiders who may try to gain unauthorized get right of entry to into personal person facts saved inside cloud websites. Another benefit of the plan is that it supports dynamic operation on outsourced facts. This studies work may additionally gain the favoured protection traits, consistent with the security analysis, and its miles powerful for real-global packages, as verified by simulation outcomes of dynamic operations on various numbers of records blocks and sub-blocks.

Downloads

Download data is not yet available.

References

Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). "Controlling Data in the Cloud: Decentralized Identity and Access Management." 2009 IEEE International Conference on Cloud Computing, 85-92.

Shin, Y., Han, S., & Lee, H. (2010). "Secure Data Auditing for Cloud Computing." International Journal of Computer Applications, 12(3), 35-40.

Wang, C., Chow, S. S. M., Wang, Q., Ren, K., & Lou, W. (2013). "Privacy-Preserving Public Auditing for Shared Data with Efficient User Revocation." IEEE Transactions on Cloud Computing, 1(1), 75-87.

Li, J., Wang, B., Li, Y., & Lee, P. P. C. (2014). "Secure and Efficient Dynamic Auditing for Outsourced Data." Journal of Computer Science and Technology, 29(5), 851-864.

Zhang, Y., Xia, Z., & Sun, X. (2015). "Publicly Verifiable Audit Services for Cloud Data." IEEE International Conference on Cloud Computing, 181-188.

Sahu, M. K., Verma, M., & Kumar, S. (2020). "Dynamic Data Auditing for Secure Cloud Storage." Journal of Information Security and Applications, 50, 102425.

Yu, S., Wang, C., Ren, K., & Lou, W. (2010). "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing." IEEE INFOCOM 2010, 1-9.

Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). "Provable Data Possession at Untrusted Stores." Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), 598-609.

Juels, A., & Kaliski, B. S. (2007). "PORs: Proofs of Retrievability for Large Files." Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07), 584-597.

Erway, C. C., Küpçü, A., Papamanthou, C., & Tamassia, R. (2009). "Dynamic Provable Data Possession." Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS'09), 213-222.

Downloads

Published

01-06-2025

Issue

Section

Research Articles

How to Cite

[1]
K. Sreenivasulu and Noortaj, “Stub Signature-Based Efficient Public Data Auditing System in Cloud Computing Using Holomorphic Algorithm”, Int J Sci Res Sci Eng Technol, vol. 12, no. 3, pp. 999–1004, Jun. 2025, Accessed: Jun. 14, 2025. [Online]. Available: https://www.ijsrset.com/index.php/home/article/view/IJSRSET2512216

Similar Articles

1-10 of 278

You may also start an advanced similarity search for this article.