• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2022, Volume: 15, Issue: 17, Pages: 798-805

Original Article

Dynamic Attribute Tree for the Data Encryption and Third Party Auditing for Cloud Storage

Received Date:28 December 2021, Accepted Date:19 March 2022, Published Date:10 May 2022

Abstract

Background: To reduce the burden of the users to perform cloud audits. The tree based key handling method provides the structure format of data and increases performance in the search process. Methods: The Dynamic Attribute Tree method is proposed for Third-Party auditing to encrypt the data based on its attribute. The attributes are stored in tree structure along with data and key that helps to effectively improve the dynamic update of the data in the cloud. Findings: The proposed Dynamic Attribute Tree method has 6.7milliseconds computation time for 100 blocks of data and the existing Merkel Tree method has 7.5milliseconds computation time. Novelty: The Novelty of the project is the Dynamic Attribute Tree method uses bilinear mapping to verify the integrity of the data without retrieving the actual data from the cloud.

Keywords: Bilinear Mapping; Cloud audit; Cloud storage services; Dynamic Attribute Tree; and Third Party Auditing

References

  1. Wu J, Li Y, Wang T, Ding Y. CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing. IEEE Access. 2019;7:160482–160497. Available from: https://dx.doi.org/10.1109/access.2019.2950750
  2. Li J, Wu J, Jiang G, Srikanthan T. Blockchain-based public auditing for big data in cloud storage. Information Processing & Management. 2020;57(6):102382. Available from: https://dx.doi.org/10.1016/j.ipm.2020.102382
  3. Li X, Liu S, Lu R. Comments on “A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data”. IEEE Transactions on Information Forensics and Security. 2020;15:2881–2883. Available from: https://dx.doi.org/10.1109/tifs.2020.2978592
  4. Mishachandar B, Vairamuthu S, Pavithra M. A data security and integrity framework using third-party cloud auditing. International Journal of Information Technology. 2021;13(5):2081–2089. Available from: https://dx.doi.org/10.1007/s41870-021-00738-3
  5. Yang Z, Wang W, Huang Y, Li X. Privacy‐Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage. Chinese Journal of Electronics. 2019;28(1):179–187. Available from: https://dx.doi.org/10.1049/cje.2018.02.017
  6. Huang P, Fan K, Yang H, Zhang K, Li H, Yang Y. A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System. IEEE Access. 2020;8:94780–94794. Available from: https://dx.doi.org/10.1109/access.2020.2993606
  7. Xu Y, Zhang C, Wang G, Qin Z, Zeng Q. A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services. IEEE Transactions on Emerging Topics in Computing. 2021;9(3):1421–1432. Available from: https://dx.doi.org/10.1109/tetc.2020.3005610
  8. Huang P, Fan K, Yang H, Zhang K, Li H, Yang Y. A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System. IEEE Access. 2020;8:94780–94794. Available from: https://dx.doi.org/10.1109/access.2020.2993606
  9. Luo W, Ma W, Gao J. MHB*T based dynamic data integrity auditing in cloud storage. Cluster Computing. 2021;24(3):2115–2132. Available from: https://dx.doi.org/10.1007/s10586-021-03248-w
  10. Wang H, Qin H, Zhao M, Wei X, Shen H, Susilo W. Blockchain-based fair payment smart contract for public cloud storage auditing. Information Sciences. 2020;519:348–362. Available from: https://dx.doi.org/10.1016/j.ins.2020.01.051
  11. Deng L, Yang B, Wang X. A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage. IEEE Access. 2020;8:206396–206405. Available from: https://dx.doi.org/10.1109/access.2020.3037696
  12. Wang T, Mei Y, Liu X, Wang J, Dai HN, Wang Z. Edge-based auditing method for data security in resource-constrained Internet of Things. Journal of Systems Architecture. 2021;114:101971. Available from: https://dx.doi.org/10.1016/j.sysarc.2020.101971
  13. Li J, Zhang Y, Ning J, Huang X, Poh GS, Wang D. Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Transactions on Cloud Computing. 2020;p. 1. Available from: https://dx.doi.org/10.1109/tcc.2020.2975184

Copyright

© 2022 Rajashekar & Sundaram. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.