Open Access Open Access  Restricted Access Subscription or Fee Access

Proof of Retrievability Using Elliptic Curve Digital Signature in Cloud Computing


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i9.2200

Abstract


Cloud computing is a general term that includes everything which is delivered as a service. Cloud computing can be identified as a technology which leverages economic growth and improvisation of usage of resources on demand. In the dream of computing world, service providers turn their infrastructure world into an environment where organizations can do their business by running their applications over the internet. Apart from that the cloud storage services enables the end users to enjoy their facility by moving their entire data onto the cloud. This facilitates the technology to focus on various security issues and challenges that has to be resolved. This paper discusses in detail about deploying a protocol by using Elliptical Curve digital signature algorithm. This proposed protocol is established to enforce a security proof by checking for the data integrity. The protocol ensures the security against third party auditor and security against the untrusted server. This paper proves its integrity of the data through a formal analysis.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Cloud Computing; Elliptical Curve Cryptography; Galois Field; Authentication; Provisioning

Full Text:

PDF


References


Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X., 2007. Provable data possession at untrusted stores. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007,pp. 598–609.
http://dx.doi.org/10.1145/1315245.1315318

Yan Xiangtao, Li Yifa Information engineering university, Zhengzhou, China, taoexcellent@163.com. “A new remote data integrity checking scheme for cloud storage “.
http://dx.doi.org/10.1109/icct.2012.6511296

Erway, C.C., Küpc¸ ü, A., Papamanthou, C., Tamassia, R., 2009. Dynamic provable data possession. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, pp. 213–222.
http://dx.doi.org/10.1145/1653662.1653688

C.Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data Storage Security in Cloud Computing,” Proc. 17th Int’l Workshop Quality of Service (IWQoS ’09), 2009.
http://dx.doi.org/10.1109/iwqos.2009.5201385

Zhuo Hao, Sheng Zhong, Member, IEEE, and Nenghai Yu, Member, IEEE, “A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability “IEEE transactions On Knowledge and Data Engineering, Vol. 23, No. 9, September 2011”.
http://dx.doi.org/10.1109/tkde.2011.62

A. Juels and B.S. Kaliski Jr., “Pors: Proofs of Retrievability for Large Files,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 584-597, 2007.
http://dx.doi.org/10.1145/1315245.1315317

Sravan Kumar, R.; Saxena, A., "Data integrity proofs in cloud storage," Communication Systems and Networks (COMSNETS), 2011 Third International Conference on, vol., no., pp.1,4, 4-8 Jan. 2011. doi: 10.1109/COMSNETS.2011.5716422
http://dx.doi.org/10.1109/comsnets.2011.5716422

Hung-Zih Liao, Yuan-Yuan Shen, ”On the Elliptic Curve Digital Signature Algorithm”, Tunghai, Science Vol. 8: 109126 July, 2006

Z. Hao, S. Zhong, and N. Yu, “A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability,” Technical Report 2010-11, SUNY Buffalo CSE Dept., http://www.cse.buffalo.edu/ tech-reports/2010-11.pdf, 2010.

Reza R. Farashahi, Hongfeng Wu, Chang-An Zhao, Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three, Lecture Notes in Computer Science Volume 7707, 2013, pp 135-148.
http://dx.doi.org/10.1007/978-3-642-35999-6_10

Francesc Sebe´ , Josep Domingo-Ferrer, Senior Member, IEEE, Antoni Martı´nez-Balleste´ ,Yves Deswarte, Member, IEEE, and Jean-Jacques Quisquater, Member, IEEE, “Efficient Remote Data Possession Checking in Critical Information Infrastructures” IEEE transactions On Knowledge and Data Engineering, Vol. 20, no. 8, August 2008.
http://dx.doi.org/10.1109/tkde.2007.190647

G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song, “Remote Data Checking Using Provable Data Possession”, ACM Transactions on Information and System Security, Vol. 14, No. 1, Article 12, Publication date: May 2011.
http://dx.doi.org/10.1145/1952982.1952994

Mihir R. Gohel , Bhavesh N. Gohil “A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage” Trust Management VI IFIP Advances in Information and Communication Technology Volume 374, 2012, pp 240-246
http://dx.doi.org/10.1007/978-3-642-29852-3_19

A. Jurisic, A. Menezes, “Elliptic Curves and Cryptography”, 2003, http://www.certicom.com/whitepapers.

Jena, R.K., Mahanti, P.K., Computing in the cloud: Concept and trends, (2011) International Review on Computers and Software (IRECOS), 6 (1), pp. 1-10.

Jena, R.K., Green cloud computing: Need of the hour, (2012) International Review on Computers and Software (IRECOS), 7 (1), pp. 45-52.

Narayanan, G.G., Raja Ranganathan, S., Karthik, S., An efficient user revocation and encryption methods for secure multi-owner data sharing to dynamic groups in the cloud, (2014) International Review on Computers and Software (IRECOS), 9 (5), pp. 825-831.

Mercy Gnana Rani, A., Marimuthu, A., Kavitha, A., Artificial fish swarm load balancing and job migration task with overloading detection in cloud computing environments, (2014) International Review on Computers and Software (IRECOS), 9 (4), pp. 727-734.

Jawabrah, M., Aboud, M., Enhancing performance of partitioned database in cloud computing environment, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 355-364.

Priyadharshini, M., Baskaran, R., Balaji, N., Saleem Basha, M.S., Analysis on countering XML-based attacks in web services, (2013) International Review on Computers and Software (IRECOS), 8 (9), pp. 2197-2204.

Alnouri, M., El-Koutly, R., Traffic protection as a service in MPLS cloud network, (2013) International Review on Computers and Software (IRECOS), 8 (7), pp. 1644-1649.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize