International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 179 - Issue 34 |
Published: Apr 2018 |
Authors: Jennifer Batamuliza |
![]() |
Jennifer Batamuliza . Efficient and Privacy Preserving Protocol against Insider Attack for Data Storage in Cloud Computing. International Journal of Computer Applications. 179, 34 (Apr 2018), 27-36. DOI=10.5120/ijca2018916731
@article{ 10.5120/ijca2018916731, author = { Jennifer Batamuliza }, title = { Efficient and Privacy Preserving Protocol against Insider Attack for Data Storage in Cloud Computing }, journal = { International Journal of Computer Applications }, year = { 2018 }, volume = { 179 }, number = { 34 }, pages = { 27-36 }, doi = { 10.5120/ijca2018916731 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2018 %A Jennifer Batamuliza %T Efficient and Privacy Preserving Protocol against Insider Attack for Data Storage in Cloud Computing%T %J International Journal of Computer Applications %V 179 %N 34 %P 27-36 %R 10.5120/ijca2018916731 %I Foundation of Computer Science (FCS), NY, USA
Cloud computing provides remote users a flexible and convenient way to obtain cloud services on demand such as cloud storage service, which has been facing great security and privacy challenges, especially insider attacks. However, most of the previous work on the cloud security focusing on the storage security can’t be effective against insider threats. Wei’s scheme on the cloud storage, which is based on an ID-based strong designated verifier signature (IBSDVS) protocol, takes privacy and confidentiality into consideration. But it also can’t be against insider attacks and its confidentiality exists security flaws. Hence, in this paper, we propose an efficient data storage protocol in the cloud computing, which can be against insider attacks as well as providing privacy preserving and confidentiality. Similar to Wei’s scheme, our protocol adopts an IBSDVS scheme that has the secure property of non-delegatability. Then the analysis of security and performance are described in detail.