Ensuring the security for cloud storage data using a novel ADVP protocol by multiple auditing

https://doi.org/10.53730/ijhs.v6nS2.7561

Authors

  • Libin M Joseph Research Scholar, Department of Computer Science, Karpagam Academy of Higher Education Coimbatore
  • E. J. Thomson Fredrik Professor, Department of Computer Applications, Karpagam Academy of Higher Education Coimbatore

Keywords:

cloud, security cryptography, HSCS, ADVP

Abstract

The increasing growth of storage data in the cloud and virtual reality allows it a significant challenge to maintain the security of data that is outsourced by the data owners. The existing protocols for the auditing of cloud storage normally use post-quantum cryptography to monitor data integrity to solve this issue. Nevertheless, these protocols use strong cryptography to create data tags that reduce their reliability and extensibility. In this research work, we propose a novel protocol named "Advanced Distribution Verification Protocol (ADVP)" to design secure cloud storage to track the quality of cloud-saved data with the help of "Multiple-Third Party Auditors" (mTPAs) and not a "Single-TPA" (sTPA). This protocol requires several SUBTPAs that operate throughout the single TPA, which then needs to be spread equally throughout the SUBTPAs to guarantee that every SUBTPA is checked throughout the entire section. It then has strict safety evidence of malicious cloud resistance and a promise of privacy. It would also broaden the suggested protocol and include additional implementation scenarios to enable data dynamics and batch audit. It sums up a structured process to establish security as a further contribution. 

Downloads

Download data is not yet available.

References

Herman, M., Iorga, M., Salim, A. M., Jackson, R. H., Hurst, M. R., Leo, R., Sardinas, R. (2020). NIST Cloud Computing Forensic Science Challenges. doi:10.6028/nist.ir.8006

Bhardwaj, A., & Goundar, S. (2020). Cloud Computing Security Services to Mitigate DDoS Attacks. Cloud Computing Security [Working Title]. doi:10.5772/intechopen.92683

Gupta, B. B., & Badve, O. P. (2016). Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment. Neural Computing and Applications, 28(12), 3655-3682. doi:10.1007/s00521-016-2317-5

Yousif, M. (2017). The State of the Cloud. IEEE Cloud Computing, 4(1), 4-5. doi:10.1109/mcc.2017.4

Liu, T., & Wu, G. (2018). Universal SaaS platform of internet of things for real-time monitoring. doi:10.1063/1.5033740

Stevenson, D. M., & Pasek, J. (2015). Privacy Concern, Trust, and Desire for Content Personalization. SSRN Electronic Journal. doi:10.2139/ssrn.2587541

Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. Cybernetics and Information Technologies, 16(1), 19-38. doi:10.1515/cait-2016-0002

Zhang, R., Ma, H., & Lu, Y. (2017). Fine-grained access control system based on fully outsourced attribute-based encryption. Journal of Systems and Software, 125, 344-353. doi:10.1016/j.jss.2016.12.018

Zhang, J., Chen, B., Zhao, Y., Cheng, X., & Hu, F. (2018). Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, 6, 18209-18237. doi:10.1109/access.2018.2820162

Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2019). Security Services Using Blockchains: A State of the Art Survey. IEEE Communications Surveys & Tutorials, 21(1), 858-880. doi:10.1109/comst.2018.2863956

Sheren A. El-Booz, Gamal Attiya & Nawal El-Fishawy 2016, ‘A secure cloud storage system combining time-based one-time password and automatic blocker protocol’, EURASIP Journal on Information Security, vol. 13, pp. 1-13.

Suye Namasudra & Pinki Roy 2016, ‘A new secure authentication scheme for cloud computing environment’, Willey, Concurrency And Computation: Practice And Experience, pp. 1-20.

Shraddha Mokle & Nuzhat F Shaikh 2016, ‘Anonymous Authentication for Secure Data Stored on Cloud with Decentralized Access Control’, IEEE WiSPNET, pp. 216-220.

Mansura Habiba, Md. Rafiqul Islam, Shawkat Ali, ABM & Md. Zahidul Islam 2016, ‘A New Approach to Access Control in Cloud’, Arabian Journal for Science and Engineering, Springer, vol. 41, no.3, pp. 1015-1030.

Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee &Tae Choong Chung 2016, ‘Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services’, PLOS ONE, vol. 11, no.8, pp. 1-20.

Joseph, L.M., Thomson Fredrik, E.J. (2022). A Novel Hybrid Approach Based on Filters to Ensure Cloud Storage Data Security. In: Hu, YC., Tiwari, S., Trivedi, M.C., Mishra, K.K. (eds) Ambient Communications and Computer Systems. Lecture Notes in Networks and Systems, vol 356. Springer, Singapore.

Published

18-05-2022

How to Cite

Joseph, L. M., & Fredrik, E. J. T. (2022). Ensuring the security for cloud storage data using a novel ADVP protocol by multiple auditing. International Journal of Health Sciences, 6(S2), 9794–9812. https://doi.org/10.53730/ijhs.v6nS2.7561

Issue

Section

Peer Review Articles