Javascript must be enabled to continue!
Use of data auditing for encrypted data stored in cloud environment
View through CrossRef
The exponential growth of data generation and the increasing reliance on cloud-based storage solutions have raised significant concerns regarding data security and privacy. The widespread adoption of encryption techniques has been effective in protecting data confidentiality, but it also introduces new challenges in terms of data auditing. This paper explores the use of data auditing techniques for encrypted data stored in cloud environments to ensure data integrity, availability, and accountability while preserving privacy. We first provide an overview of the current state of cloud storage security and encryption techniques, followed by a discussion on the importance of data auditing for encrypted data. The paper then delves into existing data auditing approaches, specifically focusing on Public Key-based Auditing (PKA) and Private Key-based Auditing (PrKA) schemes. We examine their advantages, drawbacks, and suitability for different scenarios, highlighting their ability to maintain data privacy without compromising the auditing process. To address the limitations of current auditing techniques, we propose an innovative hybrid auditing framework that combines the strengths of PKA and PrKA schemes. Our approach enables efficient data auditing while ensuring data confidentiality, integrity, and privacy. It also supports dynamic data operations, including insertion, deletion, and modification, allowing for seamless adaptation to various cloud storage environments. We validate the effectiveness of our proposed hybrid auditing framework through a series of experiments, comparing it with existing PKA and PrKA solutions. The results demonstrate the superiority of our framework in terms of security, privacy preservation, and performance, making it a promising solution for auditing encrypted data in cloud environments.
Auricle Technologies, Pvt., Ltd.
Title: Use of data auditing for encrypted data stored in cloud environment
Description:
The exponential growth of data generation and the increasing reliance on cloud-based storage solutions have raised significant concerns regarding data security and privacy.
The widespread adoption of encryption techniques has been effective in protecting data confidentiality, but it also introduces new challenges in terms of data auditing.
This paper explores the use of data auditing techniques for encrypted data stored in cloud environments to ensure data integrity, availability, and accountability while preserving privacy.
We first provide an overview of the current state of cloud storage security and encryption techniques, followed by a discussion on the importance of data auditing for encrypted data.
The paper then delves into existing data auditing approaches, specifically focusing on Public Key-based Auditing (PKA) and Private Key-based Auditing (PrKA) schemes.
We examine their advantages, drawbacks, and suitability for different scenarios, highlighting their ability to maintain data privacy without compromising the auditing process.
To address the limitations of current auditing techniques, we propose an innovative hybrid auditing framework that combines the strengths of PKA and PrKA schemes.
Our approach enables efficient data auditing while ensuring data confidentiality, integrity, and privacy.
It also supports dynamic data operations, including insertion, deletion, and modification, allowing for seamless adaptation to various cloud storage environments.
We validate the effectiveness of our proposed hybrid auditing framework through a series of experiments, comparing it with existing PKA and PrKA solutions.
The results demonstrate the superiority of our framework in terms of security, privacy preservation, and performance, making it a promising solution for auditing encrypted data in cloud environments.
Related Results
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
RESEARCH ON VALUE-ADDED INTERNAL AUDITING IN ENTERPRISES BASED ON VALUE CHAIN THEORY
RESEARCH ON VALUE-ADDED INTERNAL AUDITING IN ENTERPRISES BASED ON VALUE CHAIN THEORY
With the continuous development of the market economy, the business environment of enterprises has become increasingly complex. As a critical component of corporate governance, int...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary dupli...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
Developing a Cloud Computing Framework for University Libraries
Developing a Cloud Computing Framework for University Libraries
Our understanding of the library context on security challenges on storing research output on the cloud is inadequate and incomplete. Existing research has mostly focused on profit...
Privacy Preserving Data Access To Cloud
Privacy Preserving Data Access To Cloud
The current systems stress on protection of data stored in the cloud servers without giving much thought and consideration to the protection of data during user access. Encryption ...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...

