Ensuring the security for cloud storage data using a novel ADVP protocol by multiple auditing
Keywords:
cloud, security cryptography, HSCS, ADVPAbstract
The increasing growth of storage data in the cloud and virtual reality allows it a significant challenge to maintain the security of data that is outsourced by the data owners. The existing protocols for the auditing of cloud storage normally use post-quantum cryptography to monitor data integrity to solve this issue. Nevertheless, these protocols use strong cryptography to create data tags that reduce their reliability and extensibility. In this research work, we propose a novel protocol named "Advanced Distribution Verification Protocol (ADVP)" to design secure cloud storage to track the quality of cloud-saved data with the help of "Multiple-Third Party Auditors" (mTPAs) and not a "Single-TPA" (sTPA). This protocol requires several SUBTPAs that operate throughout the single TPA, which then needs to be spread equally throughout the SUBTPAs to guarantee that every SUBTPA is checked throughout the entire section. It then has strict safety evidence of malicious cloud resistance and a promise of privacy. It would also broaden the suggested protocol and include additional implementation scenarios to enable data dynamics and batch audit. It sums up a structured process to establish security as a further contribution.
Downloads
References
Herman, M., Iorga, M., Salim, A. M., Jackson, R. H., Hurst, M. R., Leo, R., Sardinas, R. (2020). NIST Cloud Computing Forensic Science Challenges. doi:10.6028/nist.ir.8006
Bhardwaj, A., & Goundar, S. (2020). Cloud Computing Security Services to Mitigate DDoS Attacks. Cloud Computing Security [Working Title]. doi:10.5772/intechopen.92683
Gupta, B. B., & Badve, O. P. (2016). Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment. Neural Computing and Applications, 28(12), 3655-3682. doi:10.1007/s00521-016-2317-5
Yousif, M. (2017). The State of the Cloud. IEEE Cloud Computing, 4(1), 4-5. doi:10.1109/mcc.2017.4
Liu, T., & Wu, G. (2018). Universal SaaS platform of internet of things for real-time monitoring. doi:10.1063/1.5033740
Stevenson, D. M., & Pasek, J. (2015). Privacy Concern, Trust, and Desire for Content Personalization. SSRN Electronic Journal. doi:10.2139/ssrn.2587541
Shynu, P. G., & Singh, K. J. (2016). A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. Cybernetics and Information Technologies, 16(1), 19-38. doi:10.1515/cait-2016-0002
Zhang, R., Ma, H., & Lu, Y. (2017). Fine-grained access control system based on fully outsourced attribute-based encryption. Journal of Systems and Software, 125, 344-353. doi:10.1016/j.jss.2016.12.018
Zhang, J., Chen, B., Zhao, Y., Cheng, X., & Hu, F. (2018). Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, 6, 18209-18237. doi:10.1109/access.2018.2820162
Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2019). Security Services Using Blockchains: A State of the Art Survey. IEEE Communications Surveys & Tutorials, 21(1), 858-880. doi:10.1109/comst.2018.2863956
Sheren A. El-Booz, Gamal Attiya & Nawal El-Fishawy 2016, ‘A secure cloud storage system combining time-based one-time password and automatic blocker protocol’, EURASIP Journal on Information Security, vol. 13, pp. 1-13.
Suye Namasudra & Pinki Roy 2016, ‘A new secure authentication scheme for cloud computing environment’, Willey, Concurrency And Computation: Practice And Experience, pp. 1-20.
Shraddha Mokle & Nuzhat F Shaikh 2016, ‘Anonymous Authentication for Secure Data Stored on Cloud with Decentralized Access Control’, IEEE WiSPNET, pp. 216-220.
Mansura Habiba, Md. Rafiqul Islam, Shawkat Ali, ABM & Md. Zahidul Islam 2016, ‘A New Approach to Access Control in Cloud’, Arabian Journal for Science and Engineering, Springer, vol. 41, no.3, pp. 1015-1030.
Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee &Tae Choong Chung 2016, ‘Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services’, PLOS ONE, vol. 11, no.8, pp. 1-20.
Joseph, L.M., Thomson Fredrik, E.J. (2022). A Novel Hybrid Approach Based on Filters to Ensure Cloud Storage Data Security. In: Hu, YC., Tiwari, S., Trivedi, M.C., Mishra, K.K. (eds) Ambient Communications and Computer Systems. Lecture Notes in Networks and Systems, vol 356. Springer, Singapore.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








