Ensuring Optimized Storage with Data Confidentiality and Privacy-Preserving for Secure Data Sharing Model Over Cloud

Authors

  • Subhash Rathod Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Mangesh D. Salunke Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Meghna Yashwante Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Manisha Bhende DPU, Dr. D. Y. Patil Schoolof Science& Technology, Tathwade, Pune
  • Sudhir R. Rangari
  • Vaibhav D. Rewaskar

Keywords:

Cloud Storage, Digital Media, Data Privacy, Data Compression, Data Security, Digital Signature

Abstract

This paper proposes privacy-preserving access control model for optimized storage over cloud. The main goal is to provide data security, privacy, integrity, and availability at a lower cost to cloud service providers while ensuring that users feel confident in trusting them. To achieve this, a secure authenticity scheme is proposed to protect data during storage and transfer over the cloud. The framework focuses on storage cost optimization while maintaining data security and authenticity. The proposed scheme compresses high-resolution images to reduce the storage size of the data by 60%. The data is then fragmented into multiple chunks, and these chunks are encrypted using the owner's private key, providing two layers of security. Only users with authority to the data can decrypt and reconstruct it into its original format. A signature is generated to check the integrity of data. If unauthorized users attempt to update data, the auditing process can identify the compromised data. Asymmetric keys are used, and when a user uploads data to the cloud, a digital signature is created with the user's private key. By implementing the suggested model, not only can the expenses associated with data storage be diminished through efficient data compression techniques, but it also introduces a well-defined data access protocol that prioritizes the preservation of data privacy. Experimental execution concludes that the proposed scheme has good performance over existing systems with a variety of aspects. The optimized storage and privacy-preserving access control model can be used to ensure secure data storage and sharing in collaborative cloud computing environments.

Downloads

Download data is not yet available.

References

Katarzyna KAPUSTA, Han QIU, and Gerard MEMMI LTCI, Telecom ParisTech, Paris, France “Secure Data Sharing with Fast Access Revocation through Untrusted Clouds” 978-1-7281-1542-9/19/$31.00 ©2019 IEEE.

Li Li, Jiayong Liub “SecACS: Enabling lightweight secure auditable cloud storage with data dynamics” 2214-2126/© 2020 Elsevier Ltd. All rights reserved.

Reyhaneh Rabaninejad, Seyyed Mahdi Sedaghat, Mohamoud Ahmadian Attari, Mohammad Reza Aref “An ID-Based Privacy-Preserving Integrity Verification of Shared Data Over Untrusted Cloud” K. N. Toosi University of Technology Department of Electrical Engineering Tehran, Iran, 978-1-7281-5937-9/20/$31.00 ©2020 IEEE

Premlata Singh, Sushil Kr. Saroj “A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage” Department of Computer Science & Engineering, Madan Mohan Malaviya University of Technology Gorakhpur, India 978-1-7281-5197-7/20/$31.00 ©2020 IEEE

Jian Wang, Kehua Wu, Chunxiao Ye, Xiaofeng Xia, Fei Ouyang ∗Colleage of Computer Science, Chongqing University, Chongqing, China “Improving Security Data Access Control for Multi-Authority Cloud Storage” 978-1-7281-4328-6/19/$31.00 ©2019 IEEE

Aritra Dutta, Rajesh Bose, Swamendu Kuma Chakraborty, Sandip Roy, Haraprasad Mondal, Computational science Brainware University, Kolkata India "Data Security Mechanism for Green Cloud", IEEE 2021

Ding ManJiang 1, Cao Kai 1, Wang ZengXi 2, Zhu LiPeng 3, 1. State Grid Jiangsu Tendering Co., Ltd, Nanjing, China 2. Jiangsu Electric Power Information Technology Co., Ltd, Nanjing, China 3. Global Energy Interconnection Research Institute Co., Ltd, Beijing, China, "Design of a Cloud Storage Security ncryption Algorithm for Power Bidding System", IEEE 2020

YANG Zhen, WANG Wenyu, HUANG Yongfeng, and LI Xing, Department of Electronic Engineering, Tsinghua University, Beijing 100084, China “Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage” 2019 Chinese Institute of Electronics. DOI:10.1049/cje.2018.02.017 ©2019 IEEE

Fei Chen, Fengming Meng, Tao Xiang, Hua Dai, Jianqiang Li, Jing Qin “Towards Usable Cloud Storage Auditing” 1045-9219 (c) 2020 IEEE

C.Jenifer Kamalin1, Dr.T.Arul Raj2, Dr.G.MuthuLakshmi3 1Research Scholar, 2, 3Assistant Professor 1,3Department of Computer Science & Engineering, Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli – 627 012 2Department of Computer Science, Sri Paramakalyani College, Alwarkurichi, Tenkasi – 627 412, “Comparative Analysis for Dct, Dwt Image Compression Performed with Huffman, Run Length and Lzw Encoding”, NTERNATIONAL JOURNAL OF SPECIAL EDUCATION Vol.37, No.3, 2022

SI HAN, KE HAN, AND SHOUYI ZHANG Department of Science and Technology, China University of Political Science and Law, 102249 China “A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era” 2169-3536 2019 IEEE.

Leyou Zhang, Yilei Cui , and Yi Mu , Senior Member, IEEE “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing” 1937-9234 © 2019 IEEE

T. A. Mohanaprakash, Dr.J.Andrews Department of CSE, Sathyabama Institute of Science and Technology, Chennai 600119, Tamilnadu, India “Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm” 978-1-7281-1576-4/19/$31.00 ©2019 IEEE

YE TAO, PENG XU, and HAI JIN, National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab “Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage” 10.1109/ACCESS.2019.2962600, IEEE Access

Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Tengfei Yang, School of Cyber Engineering, Xidian University, Xi'an 710071, China “Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation” 978-1-5386-8088-9/19/$31.00 ©2019 IEEE

Wenxiu Ding, Member, IEEE, Rui Hu, Zheng Yan, Senior Member, IEEE, Xinren Qian, Robert H. Deng, Fellow, IEEE, Laurence T. Yang, Senior Member, IEEE, and Mianxiong Dong, Member, IEEE “An Extended Framework of Privacy-Preserving Computation with Flexible Access Control” 1932-4537 (c) 2019 IEEE

HAN YU, XIUQING LU, AND ZHENKUAN PAN, College of Computer Science and Technology, Qingdao University, Qingdao 266071, China, “An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing” r 10.1109/ACCESS. 2020 IEEE

Nikolaos Doukas, Oleksandr P. Markovskyi, Nikolaos G. Bardis Department of Mathematics and Engineering Science, Hellenic Military Academy, Vari – 16673, Greece “Hash function design for cloud storage data auditing” 0304-3975/© 2019 Elsevier

Nureni Ayofe Azeez, Charles Van der Vyver School of Computer Science and Information Systems, Faculty of Natural and Agricultural Sciences, Vaal Triangle Campus, North-West University, South Africa. “Security and privacy issues in e-health cloud-based system: A comprehensive content analysis” 1110-8665/2018 Production and hosting by Elsevier

Jianghong Wei , Wenfen Liu, and Xuexian Hu “Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage” IEEE SYSTEMS JOURNAL, VOL. 12, NO. 2, JUNE 2018

Zhan Qin, Jian Weng, Yong Cui, Kui Ren, “Privacy-preserving Image Processing in the Cloud” 10.1109/MCC.2018. IEEE

Kaiping Xue, Senior Member, IEEE, Weikeng Chen, Wei Li, Jianan Hong, Peilin Hong “Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage” 1556-6013 (c) 2018 IEEE

Jianting Ning, Zhenfu Cao, Senior Member, IEEE, Xiaolei Dong, Kaitai Liang, Member, IEEE, Lifei Wei, and Kim-Kwang Raymond Choo, Senior Member, IEEE “CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage” 1939-1374 (c) 2017 IEEE

Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou Department of ECE Illinois Institute of Technology , Department of ECE Worcester Polytechnic Institute “Ensuring Data Storage Security in Cloud Computing” 978-1-4244-3876-1/09/$25.00 ©2009 IEEE

Cong Wang, Student Member, IEEE, Qian Wang, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Ning Cao, and Wenjing Lou, Senior Member, IEEE, “Toward Secure and Dependable Storage Services in Cloud Computing” 1939-1374/12/$31.00 2012 IEEE

Syam Kumar P, Subramanian R Department of Computer Science, School of Engineering & Technology Pondicherry University, Puducherry-605014, India,“An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011

CONG WANG1 (Member, IEEE), BINGSHENG ZHANG2 (Member, IEEE), KUI REN2 (Senior Member, IEEE), AND JANET M. ROVEDA3 (Senior Member, IEEE) Department of Computer Science, City University of Hong Kong, Hong Kong “Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud” IEEE TRANSACTIONS ON CLOUD COMPUTING VOL:1 NO:1 YEAR 2013

Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013

Kan Yang, Student Member, IEEE, Xiaohua Jia, Senior Member, IEEE, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 1045-9219/12/$31.00 © 2012 IEEE

Boyang Wang, Student Member, IEEE, Baochun Li, Senior Member, IEEE, and Hui Li, Member, IEEE “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2014

HUAQUN WANG1, 2 1 Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, “Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-health Record” 2169-3536 (c) 2018 IEEE

R.Swathi, T.Subha, Associate Professor, Department of Information Technology, Sri Sairam Engineering College, Chennai, swathi.marthandan@gmail.com, subharajan@gmail.com, “ENHANCING DATA STORAGE SECURITY IN CLOUD USING CERTIFICATELESS PUBLIC AUDITING” 978-1-5090-6221-8/17/$31.00 c 2017 IEEE

Nelmiawati Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia mia@polibatam.ac.id, Wahyudi Arifandi Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia wahyudi.arifandi@gmail.com,“A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service” 978-1-5386-8066-7/18/$31.00 ©2018 IEEE

Salunke M. D, Kumbharkar P. B; Kumar, P. (2021). A Proposed Methodology to Mitigate the Ransomware Attack. https://doi.org/10.3233/apc210173.

M.D.Salunke, Kumbharkar P. B; SharmaYogesh Kumar. (2020). Proposed Methodology to Prevent a Ransomware Attack. International Journal of Recent Technology and Engineering (IJRTE), 9(1), 2723–2725.

Subhash G. Rathod, R N khobragade, Vilas Thakare, Sushama L. Pawar. (2022). Security for Shared Data Over Public Cloud for Maintaining Privacy. Mathematical Statistician and Engineering Applications, 71(4), 7167–7173. Retrieved from https://www.philstat.org/index.php/MSEA/article/view/1336

Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., &Pawar,

S. (2022, September). Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-6). IEEE.

Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., Pawar, S. (2022, September). Model for Efficient Data Storage on Public Cloud. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-5). IEEE.

Subhash Gulabrao Rathod, Dr.K.H.Walse, Dr. R N khobragade, Dr. Vilas Thakare , &Sushama L. Pawar. (2022). PRESERVING PRIVACY & MAINTAINING SECURITY FOR SHARED DATA OVER PUBLIC CLOUD: A SURVEY. International Journal Of Advance Research And Innovative Ideas In Education, 8(3), 4971-4976.

Dhanwanth, B. ., Saravanakumar, R. ., Tamilselvi, T. ., & Revathi, K. . (2023). A Smart Remote Monitoring System for Prenatal Care in Rural Areas. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 30–36. https://doi.org/10.17762/ijritcc.v11i3.6196

Kanna, D. R. K. ., Muda, I. ., & Ramachandran, D. S. . (2022). Handwritten Tamil Word Pre-Processing and Segmentation Based on NLP Using Deep Learning Techniques. Research Journal of Computer Systems and Engineering, 3(1), 35–42. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/39

Downloads

Published

16.07.2023

How to Cite

Rathod, S. ., Salunke, M. D. ., Yashwante , M. ., Bhende , M. ., Rangari, S. R. ., & Rewaskar, V. D. . (2023). Ensuring Optimized Storage with Data Confidentiality and Privacy-Preserving for Secure Data Sharing Model Over Cloud. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 35–44. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3140

Issue

Section

Research Article

Most read articles by the same author(s)