Assistant-Based Integrity Auditing Scheme With Privacy Protection Function for Cloud Storage
Assistant-Based Integrity Auditing Scheme With Privacy Protection Function for Cloud Storage
- Research Article
1
- 10.1088/1742-6596/1529/2/022043
- Apr 1, 2020
- Journal of Physics: Conference Series
In recent years, the usage on cloud storage has grown, including students at tertiary level. Cloud storage helps students to store and share academic materials without additional costs. However, not many studies investigate on the students’ awareness level particularly in privacy related issues. This study examined the privacy awareness on cloud storage among students at Universiti Teknologi MARA (UiTM), Kuala Terengganu. The study examined the students’ privacy awareness, through its level of agreement on the five elements which were cloud service awareness, privacy protection, risk analysis, security awareness and data availability participants. 90 respondents from three different programs were selected from the Faculty of Computer and Mathematical Sciences (FSKM). An independent t-test and ANOVA test were conducted using SPSS. The results revealed that there was no significance difference between both genders on the privacy awareness on cloud storage. While, there was a significance difference amongst the three different programs in FSKM about privacy protection. This study concluded that these Computer Science degree students were concerned and aware about the privacy on the cloud storage, but they were not aware about the privacy related issues in the cloud storage.
- Research Article
13
- 10.11591/ijece.v10i1.pp530-537
- Feb 1, 2020
- International Journal of Electrical and Computer Engineering (IJECE)
<span lang="EN-US">Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud. </span>
- Research Article
18
- 10.1155/2021/4020784
- Jan 1, 2021
- Complexity
To solve the current privacy leakage problems of cloud storage services, research on users’ payment intention for cloud storage services with privacy protection is extremely important for improving the sustainable development of cloud storage services. An evolutionary game model between cloud storage users and providers that considers privacy is constructed. Then, the model’s evolutionary stability strategies via solving the replication dynamic equations are analyzed. Finally, simulation experiments are carried out for verifying and demonstrating the influence of model parameters. The results show that the evolutionary stable strategies are mainly affected by the privacy protection profit growth coefficient of both parties, input costs, free‐riding gains, and other factors. If the profit growth coefficient is very small, users will not choose to pay and providers will not choose to actively protect user information. As the profit growth coefficient increases, both parties will promote the development of privacy protection with a higher probability. The results are beneficial for cloud storage providers to increase the number of paid users and thus to achieve the sustainable development of cloud storage service.
- Conference Article
9
- 10.1109/mec.2013.6885340
- Dec 1, 2013
With the rapid development of cloud computing and storage technologies, an increasing number of businesses and individuals are using cloud to store or backup data. However, when users upload private data to the cloud, they lose absolute control over the data. With the continued development of cloud storage, the protection of users' privacy has become a pertinent issue to be addressed. Currently, most users make use of a mainstream encryption algorithm to encrypt data before uploading and to decrypt the data after downloading and before use. To solve this problem, in this paper, we propose a new cloud storage privacy protection method that involves bit split (BS) and bit combination (BC). BS is performed on data and reassembled to form numerous part-files before these are uploaded to the different cloud storage servers. After downloading, the part-files from multiple cloud servers are combined to re-create the original file. Experiments show that this method is effective in protecting the privacy of the users' data, with a performance improvement of ∼20 times compared with traditional encryption and decryption methods.
- Research Article
2
- 10.20473/rlj.v4-i2.2018.167-173
- Sep 30, 2019
- Record and Library Journal
Increasing the utilization of internet technology gave birth to the new challenges in the protection of privacy and personal data, especially with the increasing collection practices, the utilization and dissemination of one's personal data. Regulatory instruments and failed to become one of the trigger mechanism of the weak protection of privacy and personal data in particular in the use of cloud storage technology. Cloud storage is a technology which uses the internet and a central server that much to keep or manage user data. Cloud storage allows users to use the application without the install so that personal files can be accessed anywhere and at any time through internet access. This technology enables efficiency by concentrating storage, data processing and memory. However, on the other hand, cloud storage has raised new legal issues, namely how the personal data of users of cloud storage are protected from a variety of disclosure and distribution by cloud storage service providers to third parties.
- Research Article
333
- 10.1109/access.2020.3009876
- Jan 1, 2020
- IEEE Access
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world's digital economy are at the top of the tide. The continuous growth of data storage pressure drives the rapid development of the entire storage market on account of massive data generated. By providing data storage and management, cloud storage system becomes an indispensable part of the new era. Currently, the governments, enterprises and individual users are actively migrating their data to the cloud. Such a huge amount of data can create magnanimous wealth. However, this increases the possible risk, for instance, unauthorized access, data leakage, sensitive information disclosure and privacy disclosure. Although there are some studies on data security and privacy protection, there is still a lack of systematic surveys on the subject in cloud storage system. In this paper, we make a comprehensive review of the literatures on data security and privacy issues, data encryption technology, and applicable countermeasures in cloud storage system. Specifically, we first make an overview of cloud storage, including definition, classification, architecture and applications. Secondly, we give a detailed analysis on challenges and requirements of data security and privacy protection in cloud storage system. Thirdly, data encryption technologies and protection methods are summarized. Finally, we discuss several open research topics of data security for cloud storage.
- Research Article
24
- 10.1155/2022/6112815
- Jan 19, 2022
- Computational and Mathematical Methods in Medicine
Due to the high amount of electronic health records, hospitals have prioritized data protection. Because it uses parallel computing and is distributed, the security of the cloud cannot be guaranteed. Because of the large number of e-health records, hospitals have made data security a major concern. The cloud's security cannot be guaranteed because it uses parallel processing and is distributed. The blockchain (BC) has been deployed in the cloud to preserve and secure medical data because it is particularly prone to security breaches and attacks such as forgery, manipulation, and privacy leaks. An overview of blockchain (BC) technology in cloud storage to improve healthcare system security can be obtained by reading this paper. First, we will look at the benefits and drawbacks of using a basic cloud storage system. After that, a brief overview of blockchain cloud storage technology will be offered. Many researches have focused on using blockchain technology in healthcare systems as a possible solution to the security concerns in healthcare, resulting in tighter and more advanced security requirements being provided. This survey could lead to a blockchain-based solution for the protection of cloud-outsourced healthcare data. Evaluation and comparison of the simulation tests of the offered blockchain technology-focused studies can demonstrate integrity verification with cloud storage and medical data, data interchange with reduced computational complexity, security, and privacy protection. Because of blockchain and IT, business warfare has emerged, and governments in the Middle East have embraced it. Thus, this research focused on the qualities that influence customers' interest in and approval of blockchain technology in cloud storage for healthcare system security and the aspects that increase people's knowledge of blockchain. One way to better understand how people feel about learning how to use blockchain technology in healthcare is through the United Theory of Acceptance and Use of Technology (UTAUT). A snowball sampling method was used to select respondents in an online poll to gather data about blockchain technology in Middle Eastern poor countries. A total of 443 randomly selected responses were tested using SPSS. Blockchain adoption has been shown to be influenced by anticipation, effort expectancy, social influence (SI), facilitation factors, personal innovativeness (PInn), and a perception of security risk (PSR). Blockchain adoption and acceptance were found to be influenced by anticipation, effort expectancy, social influence (SI), facilitating conditions, personal innovativeness (PInn), and perceived security risk (PSR) during the COVID-19 pandemic, as well as providing an overview of current trends in the field and issues pertaining to significance and compatibility.
- Research Article
2
- 10.12688/openreseurope.16631.1
- Jun 28, 2024
- Open Research Europe
The cloud, essentially a network of interconnected computers, has revolutionized data storage and sharing. Cloud storage, an integral part of this ecosystem, offers a virtual storage space spanning numerous physical devices. This technology relies on internet-based platforms hosted in data centers provided by service giants like Apple iCloud, Microsoft OneDrive, and Google Cloud Storage. While cloud storage enhances accessibility and convenience, it also introduces heightened risks, primarily due to the transfer of essential services to third-party providers. These risks encompass challenges related to security, privacy, data support, service availability, and regulatory compliance. Cloud storage, characterized by remote data transmission and storage on networked servers, offers a paradigm shift in data management. Users access these remote storage systems via the internet, paying providers based on usage rates. In this paper, we evaluate the security features of four Cloud Storage providers: Sync, pCloud, IceDrive, and Egnyte, with a specific focus on privacy and personal data protection. This paper presents a comprehensive analysis of privacy and security aspects in four prominent Cloud Storage services: Sync, pCloud, IceDrive, and Egnyte. The primary objective is to underscore the significance of privacy in the realm of Cloud Storage. Employing methods such as analysis and synthesis, comparative analysis, and empirical meta-analysis, this research delves into the core characteristics of these platforms, focusing on security, compliance, governance, and data protection.
- Book Chapter
- 10.1007/978-981-19-0468-4_7
- Jan 1, 2022
With the development of education, educational big data is taking shape, and the cloud has a natural advantage of storing big data. Data is usually stored in the cloud server in the form of ciphertext for the sake of privacy protection. However, this is against the use of data. Currently, although the search schemes under ciphertext are primarily based on keywords, these schemes fail to reflect the actual needs of users well. Moreover, the quality of educational resources varies. Therefore, ensuring users’ privacy protection while providing high-quality educational resources is challenging. In order to solve this problem, a Smart Search over Encrypted Educational Resources (SSEER) in cloud storage was proposed in this paper. The contribution of this paper is mainly reflected in two aspects: First, SSEER introduces a trusted third party (TTP) server to obtain a large number of educational resources through crowdsourcing. Second, the index is updated based on the user’s use of educational resources, through which high-quality educational resources can be identified, thus increasing the probability for users to access quality resources. As a result, the educational resource graph can screen out the educational resources related to the user search.KeywordsPersonalized searchResource graphSearchable encryptionCloud computingCrowdsourcing
- Research Article
- 10.55041/ijsrem49262
- May 31, 2025
- INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Abstract: The rapid advancement of cloud computing technology, coupled with the exponential increase in unstructured data, has led to heightened interest and significant progress in cloud storage solutions. However, cloud service providers often lack insights into the data they store and manage globally across their platforms. To address privacy concerns, various encoding technologies have been developed to enhance data protection. This paper proposes a three-tiered security framework for cloud storage that optimally utilizes cloud resources while safeguarding data privacy. Our approach involves segmenting data into multiple components, ensuring that the loss of any single piece results in the loss of the entire dataset. We implement a bucket-based algorithm to secure the data, demonstrating both protection and efficiency within our proposed model. Furthermore, leveraging process intelligence, this algorithm will assess the distribution ratios of data stored across cloud, fog, and local environments. Keywords: Cloud Storage Security, Cloud Storage, Three-Layer Storage Security, Privacy Protection, DLP
- Research Article
17
- 10.1016/j.jisa.2018.01.004
- Feb 2, 2018
- Journal of Information Security and Applications
A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter
- Conference Article
1
- 10.1109/waina.2013.231
- Mar 1, 2013
Cloud Computing has been envisioned as the next-wave system architectures of IT. Essentially, it can have ubiquitous access through variety of devices and applications provided by cloud service providers. In particular, cloud storage service brings benefits not only low cost and scalability, but also great appropriateness for group working, such as learning resource storage. However, the data security and privacy protection is still regarded as challenges. This paper aims the present problem, a secure shared group model of cloud storage is presented. With the using of crypto logical technology, the groups share their data security and efficiency. According to our security analysis and efficiency evaluation, the proposed model have lightweight overheads in terms of keys management as also security and confidentiality can be protected in cloud storage.
- Research Article
1
- 10.1088/1742-6596/1288/1/012068
- Aug 1, 2019
- Journal of Physics: Conference Series
Cloud storage is widely used by both individual users and organizational users due to its efficient and scalable data storage services. Because of the vulnerabilities of hardware/software, human error and malicious attacks, the audit of data integrity in cloud has become the focus of research. However, how to efficiently check the integrity of cloud data and protect the confidentiality of shared data and anonymity of user identity, is still a sharp problem. In this paper, we propose a privacy-preserving mechanism to reduce the security risks in existing schemes, which enables public auditing on shared cloud data. Specifically, identity-based signature is introduced in our scheme, which effectively prevents collusion attack from forgery of signatures. At the same time, the auditors cannot obtain the identity of the signer on shared data. In addition, multiple auditing tasks can be accomplished at one time rather than one by one in our scheme, thus, the efficiency of verification is greatly improved. The theoretical analyses shows that our scheme is correct, secure and privacy protection, and our experiments show that our scheme can efficiently achieve integrity audit of cloud data.
- Book Chapter
- 10.1007/978-3-030-49795-8_11
- Dec 1, 2020
To provide privacy protection in the cloud, cloud storage auditing with improved strong key-exposure resilient (CSA-ISKER) was proposed to solve key exposure problems during cloud auditing services. In this paper, Cloud Storage Integrity checking and Auditing- ISKER (CSIA-ISKER) is proposed to further enhance the performance of CSA-ISKER. The integrity of their outsourced files is remaining as the major concern for cloud users. Other variables such as cloud service providers do not have full confidence, and the storage information can be compromised due to their management failures on a cloud server, adversary attacks, or failure. Hence data integrity has become a primary concern in CSIA-ISKER. In CSIA-ISKER, the private key generator is introduced to generate keys for users by using the user’s identity information. It reduces the key exposure problem. Also, CSIA-identity-based privacy and traceability-ISKER (CSIA-IPT-ISKER) is proposed to preserve the privacy of user identity and ensures the traceability of user identity.
- Conference Article
- 10.1109/icitec.2014.7105568
- Dec 1, 2014
With the rapid development and widely-use of cloud computing, nowadays more and more users store data in the cloud storages. Some users, especially enterprise users, who have more privacy requirements, urgently need a solution where the cloud storage can be encrypted and retrieved rapidly and also open to internal staff only. However, to protect the privacy of data, the data must be encrypted when it is uploaded. This will greatly reduce the efficiency of retrieval. On the basis of the above, the author proposes a solution which can provide privacy protection and rapid fuzzy search under cloud computing environment. This solution can provide a more reasonable and efficient data storage and retrieval services to the user's data.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.