Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Use of data auditing for encrypted data stored in cloud environment

View through CrossRef
The exponential growth of data generation and the increasing reliance on cloud-based storage solutions have raised significant concerns regarding data security and privacy. The widespread adoption of encryption techniques has been effective in protecting data confidentiality, but it also introduces new challenges in terms of data auditing. This paper explores the use of data auditing techniques for encrypted data stored in cloud environments to ensure data integrity, availability, and accountability while preserving privacy. We first provide an overview of the current state of cloud storage security and encryption techniques, followed by a discussion on the importance of data auditing for encrypted data. The paper then delves into existing data auditing approaches, specifically focusing on Public Key-based Auditing (PKA) and Private Key-based Auditing (PrKA) schemes. We examine their advantages, drawbacks, and suitability for different scenarios, highlighting their ability to maintain data privacy without compromising the auditing process. To address the limitations of current auditing techniques, we propose an innovative hybrid auditing framework that combines the strengths of PKA and PrKA schemes. Our approach enables efficient data auditing while ensuring data confidentiality, integrity, and privacy. It also supports dynamic data operations, including insertion, deletion, and modification, allowing for seamless adaptation to various cloud storage environments. We validate the effectiveness of our proposed hybrid auditing framework through a series of experiments, comparing it with existing PKA and PrKA solutions. The results demonstrate the superiority of our framework in terms of security, privacy preservation, and performance, making it a promising solution for auditing encrypted data in cloud environments.
Title: Use of data auditing for encrypted data stored in cloud environment
Description:
The exponential growth of data generation and the increasing reliance on cloud-based storage solutions have raised significant concerns regarding data security and privacy.
The widespread adoption of encryption techniques has been effective in protecting data confidentiality, but it also introduces new challenges in terms of data auditing.
This paper explores the use of data auditing techniques for encrypted data stored in cloud environments to ensure data integrity, availability, and accountability while preserving privacy.
We first provide an overview of the current state of cloud storage security and encryption techniques, followed by a discussion on the importance of data auditing for encrypted data.
The paper then delves into existing data auditing approaches, specifically focusing on Public Key-based Auditing (PKA) and Private Key-based Auditing (PrKA) schemes.
We examine their advantages, drawbacks, and suitability for different scenarios, highlighting their ability to maintain data privacy without compromising the auditing process.
To address the limitations of current auditing techniques, we propose an innovative hybrid auditing framework that combines the strengths of PKA and PrKA schemes.
Our approach enables efficient data auditing while ensuring data confidentiality, integrity, and privacy.
It also supports dynamic data operations, including insertion, deletion, and modification, allowing for seamless adaptation to various cloud storage environments.
We validate the effectiveness of our proposed hybrid auditing framework through a series of experiments, comparing it with existing PKA and PrKA solutions.
The results demonstrate the superiority of our framework in terms of security, privacy preservation, and performance, making it a promising solution for auditing encrypted data in cloud environments.

Related Results

CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
“Cloud Computing – Navigating the Digital Sky” is an extensive guide designed to provide a thorough understanding of cloud computing, an essential technology in today’s digital age...
RESEARCH ON VALUE-ADDED INTERNAL AUDITING IN ENTERPRISES BASED ON VALUE CHAIN THEORY
RESEARCH ON VALUE-ADDED INTERNAL AUDITING IN ENTERPRISES BASED ON VALUE CHAIN THEORY
With the continuous development of the market economy, the business environment of enterprises has become increasingly complex. As a critical component of corporate governance, int...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary dupli...
Aerosol-cloud interaction inferred from MODIS satellite data and global aerosol models
Aerosol-cloud interaction inferred from MODIS satellite data and global aerosol models
Abstract. We have used the Modis satellite data and two global aerosol models to investigate relationships between aerosol optical depth (AOD) and cloud parameters that may be affe...
AI-driven zero-touch orchestration of edge-cloud services
AI-driven zero-touch orchestration of edge-cloud services
(English) 6G networks demand orchestration systems capable of managing thousands of distributed microservices under sub-millisecond latency constraints. Traditional centralized app...

Back to Top