A Survey on Audit Free Cloud Storage via Deniable Attribute Based Encryption

P. Santhi, S. Thilagamani
{"title":"A Survey on Audit Free Cloud Storage via Deniable Attribute Based Encryption","authors":"P. Santhi, S. Thilagamani","doi":"10.21013/JTE.V5.N1.P1","DOIUrl":null,"url":null,"abstract":"Cloud computing is a rising technology which provider an assortment of opportunities for online distribution of resources or services. The most effective advantage of using cloud computing is higher availability of services with less cost and simple scalability. While the storage space of shared data on remote servers is not a new development, current development of cloud computing validates a more careful look at its actual consequences involving privacy and confidentiality issues. As users no longer actually possess the storage of their data, traditional cryptographic primitives for the purpose of data protection cannot be directly accepted. In particular, simply downloading all the data for its integrity confirmation is not a realistic explanation due to the expensiveness in I/O and transmission cost across the network. Besides, it is often not enough to detect the data corruption only when contacting the data, as it does not offer users correctness assurance for those un-accessed information and might be too late to recover the data loss or damage. To fully make sure the data integrity and save the cloud users’ calculation resources as well as online burden, it is of critical importance to allow public auditing service for cloud data, so that users may choice to an independent third party auditor (TPA) to audit the contract out data when needed. The TPA, who has expertise and abilities that users do not, can occasionally check the honesty of all the data stored in the cloud on behalf of the users, which provides a much more better and reasonable way for the users to ensure their storage rightness in the cloud. In a word, allowing public auditing services will play an important role for this emerging cloud market to become fully recognized; where users will need ways to evaluate risk and gain hope in the cloud.","PeriodicalId":269688,"journal":{"name":"IRA-International Journal of Technology & Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IRA-International Journal of Technology & Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21013/JTE.V5.N1.P1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Cloud computing is a rising technology which provider an assortment of opportunities for online distribution of resources or services. The most effective advantage of using cloud computing is higher availability of services with less cost and simple scalability. While the storage space of shared data on remote servers is not a new development, current development of cloud computing validates a more careful look at its actual consequences involving privacy and confidentiality issues. As users no longer actually possess the storage of their data, traditional cryptographic primitives for the purpose of data protection cannot be directly accepted. In particular, simply downloading all the data for its integrity confirmation is not a realistic explanation due to the expensiveness in I/O and transmission cost across the network. Besides, it is often not enough to detect the data corruption only when contacting the data, as it does not offer users correctness assurance for those un-accessed information and might be too late to recover the data loss or damage. To fully make sure the data integrity and save the cloud users’ calculation resources as well as online burden, it is of critical importance to allow public auditing service for cloud data, so that users may choice to an independent third party auditor (TPA) to audit the contract out data when needed. The TPA, who has expertise and abilities that users do not, can occasionally check the honesty of all the data stored in the cloud on behalf of the users, which provides a much more better and reasonable way for the users to ensure their storage rightness in the cloud. In a word, allowing public auditing services will play an important role for this emerging cloud market to become fully recognized; where users will need ways to evaluate risk and gain hope in the cloud.
基于可否认属性加密的免审计云存储研究
云计算是一种新兴的技术,它为在线分配资源或服务提供了各种机会。使用云计算的最有效优势是以更低的成本和简单的可伸缩性获得更高的服务可用性。虽然远程服务器上共享数据的存储空间并不是一个新的发展,但云计算的当前发展验证了对其涉及隐私和机密性问题的实际后果的更仔细的观察。由于用户不再实际拥有其数据的存储,因此以数据保护为目的的传统加密原语不能被直接接受。特别是,简单地下载所有数据以确认其完整性并不是一个现实的解释,因为I/O和跨网络的传输成本非常昂贵。此外,仅在接触数据时检测数据损坏往往是不够的,因为它不能为用户提供未访问信息的正确性保证,并且可能无法恢复数据丢失或损坏。为了充分保证数据的完整性,节省云用户的计算资源和在线负担,允许对云数据进行公共审计服务至关重要,用户可以在需要时选择独立的第三方审计机构(TPA)对合同外包数据进行审计。TPA拥有用户所不具备的专业知识和能力,可以偶尔代表用户对存储在云中所有数据的真实性进行检查,这为用户确保其在云中存储的正确性提供了一种更好、更合理的方式。总之,允许公共审计服务将对这个新兴的云市场得到充分认可发挥重要作用;用户将需要评估风险并在云计算中获得希望的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信