Javascript must be enabled to continue!
Use of data auditing for encrypted data stored in cloud environment
View through CrossRef
The exponential growth of data generation and the increasing reliance on cloud-based storage solutions have raised significant concerns regarding data security and privacy. The widespread adoption of encryption techniques has been effective in protecting data confidentiality, but it also introduces new challenges in terms of data auditing. This paper explores the use of data auditing techniques for encrypted data stored in cloud environments to ensure data integrity, availability, and accountability while preserving privacy. We first provide an overview of the current state of cloud storage security and encryption techniques, followed by a discussion on the importance of data auditing for encrypted data. The paper then delves into existing data auditing approaches, specifically focusing on Public Key-based Auditing (PKA) and Private Key-based Auditing (PrKA) schemes. We examine their advantages, drawbacks, and suitability for different scenarios, highlighting their ability to maintain data privacy without compromising the auditing process. To address the limitations of current auditing techniques, we propose an innovative hybrid auditing framework that combines the strengths of PKA and PrKA schemes. Our approach enables efficient data auditing while ensuring data confidentiality, integrity, and privacy. It also supports dynamic data operations, including insertion, deletion, and modification, allowing for seamless adaptation to various cloud storage environments. We validate the effectiveness of our proposed hybrid auditing framework through a series of experiments, comparing it with existing PKA and PrKA solutions. The results demonstrate the superiority of our framework in terms of security, privacy preservation, and performance, making it a promising solution for auditing encrypted data in cloud environments.
Auricle Technologies, Pvt., Ltd.
Title: Use of data auditing for encrypted data stored in cloud environment
Description:
The exponential growth of data generation and the increasing reliance on cloud-based storage solutions have raised significant concerns regarding data security and privacy.
The widespread adoption of encryption techniques has been effective in protecting data confidentiality, but it also introduces new challenges in terms of data auditing.
This paper explores the use of data auditing techniques for encrypted data stored in cloud environments to ensure data integrity, availability, and accountability while preserving privacy.
We first provide an overview of the current state of cloud storage security and encryption techniques, followed by a discussion on the importance of data auditing for encrypted data.
The paper then delves into existing data auditing approaches, specifically focusing on Public Key-based Auditing (PKA) and Private Key-based Auditing (PrKA) schemes.
We examine their advantages, drawbacks, and suitability for different scenarios, highlighting their ability to maintain data privacy without compromising the auditing process.
To address the limitations of current auditing techniques, we propose an innovative hybrid auditing framework that combines the strengths of PKA and PrKA schemes.
Our approach enables efficient data auditing while ensuring data confidentiality, integrity, and privacy.
It also supports dynamic data operations, including insertion, deletion, and modification, allowing for seamless adaptation to various cloud storage environments.
We validate the effectiveness of our proposed hybrid auditing framework through a series of experiments, comparing it with existing PKA and PrKA solutions.
The results demonstrate the superiority of our framework in terms of security, privacy preservation, and performance, making it a promising solution for auditing encrypted data in cloud environments.
Related Results
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
CLOUD COMPUTING - NAVIGATING THE DIGITAL SKY
“Cloud Computing – Navigating the Digital Sky” is an extensive guide designed to provide a thorough understanding of cloud computing, an essential technology in today’s digital age...
The Impact of Cloud-Based Enterprise Resource Planning System on Blockchain Adoption, with the Presence of Cloud Auditing as an Intermediary Variable in Jordanian Commercial Banks
The Impact of Cloud-Based Enterprise Resource Planning System on Blockchain Adoption, with the Presence of Cloud Auditing as an Intermediary Variable in Jordanian Commercial Banks
The study aimed to determine the impact of a cloud-based Enterprise Resource Planning (ERP) system on the adoption of blockchain technology, with the presence of cloud auditing as ...
RESEARCH ON VALUE-ADDED INTERNAL AUDITING IN ENTERPRISES BASED ON VALUE CHAIN THEORY
RESEARCH ON VALUE-ADDED INTERNAL AUDITING IN ENTERPRISES BASED ON VALUE CHAIN THEORY
With the continuous development of the market economy, the business environment of enterprises has become increasingly complex. As a critical component of corporate governance, int...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
VASD2OM: Virtual Auditing and Secure Deduplication with Dynamic Ownership Management in Cloud
In cloud repository amenities, deduplication technology is often utilized to minimize the volume and bandwidth by removing repetitious information and caching only a solitary dupli...
Aerosol-cloud interaction inferred from MODIS satellite data and global aerosol models
Aerosol-cloud interaction inferred from MODIS satellite data and global aerosol models
Abstract. We have used the Modis satellite data and two global aerosol models to investigate relationships between aerosol optical depth (AOD) and cloud parameters that may be affe...
AI-driven zero-touch orchestration of edge-cloud services
AI-driven zero-touch orchestration of edge-cloud services
(English) 6G networks demand orchestration systems capable of managing thousands of distributed microservices under sub-millisecond latency constraints. Traditional centralized app...

