Research Article

An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method

by  Sneha Singha, S. D. Satav
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Issue 9
Published: Jul 2016
Authors: Sneha Singha, S. D. Satav
10.5120/ijca2016910907
PDF

Sneha Singha, S. D. Satav . An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method. International Journal of Computer Applications. 146, 9 (Jul 2016), 41-44. DOI=10.5120/ijca2016910907

                        @article{ 10.5120/ijca2016910907,
                        author  = { Sneha Singha,S. D. Satav },
                        title   = { An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 146 },
                        number  = { 9 },
                        pages   = { 41-44 },
                        doi     = { 10.5120/ijca2016910907 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Sneha Singha
                        %A S. D. Satav
                        %T An Effective Approach for Key Exposure Resistance in Cloud using De Duplication and Tile Bitmap Method%T 
                        %J International Journal of Computer Applications
                        %V 146
                        %N 9
                        %P 41-44
                        %R 10.5120/ijca2016910907
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Since a lot of data is dynamically updated and stored in today’s scenario, the previous methods used for checking static data integrity can no longer be applied to analyze the integrity of the stored dynamic data in the cloud. In the existing system, the authors had focused on key management in a built in key exposure resilient system. In this paper, we have introduced the concept of de duplication strategy of data wherein the built-in key exposure resilient system will check the duplicacy of data and eliminate the redundant one using MD5 hashing. This will enforce space management in an efficient manner. Also, tile bitmap technique is used wherein the intrusions can be detected without any tampering of data to maintain its integrity.

References
  • Jia Yu and Kui Ren, “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” in IEEE transactions on information forensics and security, VOL XX, NO1., 2015.
  • K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409-428, 2012.
  • B. Chen and R. Curtmola, “Auditable Version Control Systems,” 2014 Network and Distributed System Security Symposium, 2014.
  • K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Trans. Parallel and Distributed Systems, Vol. 24, No. 9, pp. 1717-1726, 2013.
  • Y. Zhu, H.G. Ahn, H. Hu, S.S. Yau, H.J. An, and C.J. Hu, “Dynamic Audit Services for Outsourced Storages in Clouds,” IEEE Trans. on Services Computing, vol. 6, no. 2, pp. 409-428, 2013.
  • C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage,” IEEE Trans. Computers, Vol. 62, No. 2, pp. 362-375, 2013.
  • R. Canetti, S. Halevi and J. Katz, “A forward-secure public-key encryption scheme,” Advances in Cryptology- EUROCRYPT’03, pp. 255-271, 2003.
  • Imran Ahmad and Hitesh Gupta, “Privacy preserving public auditing and data integrity for secure cloud storage” International conference on cloud, big data and trust 2013, Nov 13-15.
  • Ebenezer R.H.P. Isaac, Joseph H.R. Isaac and J. Visumathi, “Reverse Circle Cipher for Personal and Network Security” Information Communication and Embedded Systems(ICICES), 2013 International conference, pp 346-351, Feb 2013.
  • Kyriacos E. Pavlou and Richard T. Snodgrass, “The Tiled Bitmap Forensic Analysis Algorithm” IEEE Trans on knowledge and data engineering, Volume 22, No 4, pp 590 – 601, May 2009.
  • https://en.wikipedia.org/wiki/MD5.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cloud computing Third Party Auditor Key-exposure resistance De-duplication Reverse Circle Cipher Tile Bitmap

Powered by PhDFocusTM