An Efficient Secure and Privacy Cloud Auditing in Winternitz Signature Scheme

Authors

  • M. Mageshwari Research Scholar, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Chennai, Tamilnadu, India-603 203
  • R. Naresh Associate Professor, Department of Networking and Communications, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Chennai, Tamilnadu, India-603 203

Keywords:

Cloud Server, Security Audits, Third party Audit (TPA), Signature scheme

Abstract

This cloud computing approach gives customers access to many platforms and delivers scalable, on-demand services whenever and wherever they are needed. The main issues in an outsourcing approach occur because users no longer possess access and ownership of their data, which means it is more challenging to conduct appropriate security audits. Winternitz Signature Scheme (WSS) is an extremely important cryptosystem. Not only may many signatures be compressed into a shorter signatures, but also guarantee the authenticity of each signature taking part in the combination by checking if the resultant aggregate signature is valid. Cloud server, Third Party Audit (TPA), and Data owners providers are all needed to complete the service. For the data owner, these processes include dividing the blocks in file, each encrypts of them, calculating a hash key, then merging them back together to produce a signature, and finally transmitting the result. The new audit method has used to cope with all these requirements. In this approach, the cloud server maintains a verifiable secure signature scheme, allowing for batch auditing. When it comes to practical arrangements, the efficiency and security of our approach are shown by the fact that it is reducing the computing and communication auditing process cost, which is particularly beneficial.

Downloads

Download data is not yet available.

References

A. Saranya, R. Naresh “Cloud Based Efficient Authentication for Mobile Payments using Key Distribution Method”, Journal of Ambient Intelligence and Humanized Computing, Springer, 02 January, 2021. DOI: 10.1007/s12652-020-02765-7

H. Tian, F. Nan, H. Jiang, C.C. Chang, J. Ning, Y. Huang “Public auditing for shared cloud data with efficient and secure group management”, Inf. Sci., 472 (2019), pp. 107-125.

R. Naresh, P. Vijayakumar, L. Jegatha Deborah, R. Sivakumar, “A Novel Trust Model for Secure Group Communication in Distributed Computing”, Special Issue for Security and Privacy in Cloud Computing, Journal of Organizational and End User Computing, IGI Global, Vol.32, No. 3, September 2020, Pp. 1-14. DOI: 10.4018/JOEUC.2020070101

Y. Sun, Q. Liu, X. Chen, X. Du “An adaptive authenticated data structure with privacy-preserving for big data stream in cloud” IEEE Trans. Inf. Forensics Secur., 15 (2020), pp. 3295-3310.

A. Saranya, R. Naresh “Efficient mobile security for E health care application in cloud for secure payment using key distribution”, Neural Processing Letters, Springer, 2021, DOI: 10.1007/s11063-021-10482-1

He M, “Certificateless provable data possession scheme for cloud-based smart grid data management systems”, IEEE Trans. Ind. Inf., 14 (3) (2018), pp. 1232-1241.

R. Naresh, M. Sayeekumar, G. M. Karthick, P. Supraja, “Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm”, Soft Computing, Springer, Vol.23, No. 8, 2019, Pp. 2561-2574. Doi: https://doi.org/10.1007/s00500-019-03790-1

X. Lu, Z. Pan, H. Xian ”An efficient and secure data sharing scheme for mobile devices in cloud computing” J. Cloud Computing., 9 (1) (2020), pp. 1-13.

P. Vijayakumar, R. Naresh, L. Jegatha Deborah, SK Hafizul Islam, “An efficient group key agreement protocol for secure P2P communication”, Security and Communication Networks, Wiley, Vol.9, No.17, pp.3952–3965, 2016. http://onlinelibrary.wiley.com/doi/10.1002/sec.1578/abstract

Wang J, Zhao Y et al., “Providing Privacy Preserving. In cloud computing”, International Conference on Test and Measurement, vol. 2, pp. 213–216, 2009.

P. Vijayakumar, R. Naresh, SK Hafizul Islam, L. Jegatha Deborah “An Effective Key Distribution for Secure Internet Pay-TV using Access Key Hierarchies”, Security and Communication Networks, Wiley, Vol.9, No.18, pp.5085–5097, 2016. http://onlinelibrary.wiley.com/doi/10.1002/sec.1578/full

Daniel, E., Vasanthi, N.A: LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Clust. Comput. 22(1), 1247–1258 (2019)

R. Naresh, M Meenakshi, G Niranjana, “Efficient study of Smart Garbage Collection for Ecofriendly Environment”, Journal of Green Engineering, Vol.10, No.1, pp.1-10, Feb 2020.

Wang, T, An alternative approach to public cloud data auditing supporting data dynamics. Soft Computing. 23(13), 4939–4953 (2019).

R Divya Mounika, R. Naresh, “The concept of Privacy and Standardization of Microservice Architectures in cloud computing”, European Journal of Molecular & Clinical Medicine, Vol 7, No 2, Pages 5349-5370, Dec 2020.

Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy Preserving Public Auditing for Secure Cloud Storage. http://eprint.iacr.org/2009/579.pdf

R. Naresh, AyonGupta, Sanghamitra, “MALICIOUS URL DETECTION SYSTEM USING COMBINED SVM AND LOGISTIC REGRESSION MODEL”, International Journal of Advanced Research in Engineering and Technology (IJARET), Vol.10, No.4, pp. 63-73, May 2020.

Priyadharshni, Geo Jenefer. G “Enhancing Data Security in Cloud Storage Auditing With Key Abstraction” Vo.2, Issue 2, Oct 2015.

M. Meenakshi, R Naresh, S Pradeep “Smart Home: Security and Acuteness in Automation of IOT Sensors”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 1, pp. 3271- 3274, Nov 2019.

Liu, C., et al.: MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2014).

Chen Y C, Tso R, Mambo M, Huang K, Horng G (2015) Certificateless aggregate signature with efficient verification. Security and Communication Networks8(13):2232–2243

Li J, Yuan H, Zhang Y (2018) Cryptanalysis and improvement for certificateless aggregate signature. Fundamental Informatica

Mageshwari. M and Dr.R.Naresh,” Survey on Cloud Auditing by using Integrity Checking Algorithm and Key Validation Mechanism”, Proceedings of International Conference for information and communication Technology’-(ICTCS- 2022). Lecture Notes in Networks and Systems (LNNS, volume 396) DOI: 978-981-16-9967-2, 2022.

Mageshwari. M and R. Naresh,” Decentralized Data Privacy Protection and Cloud Auditing Security Management”, Proceedings of International Conference on Computing, Communication, and Intelligent Systems-(ICCCIS-2022). DOI:10.1109/ICCCIS56430.2022.10037676, 2023.

S. Sakthipriya, R. Naresh, Effective Energy Estimation Technique to Classify the Nitrogen and Temperature for Crop Yield Based Green House Application, Sustain. Comput. Inform. Syst.35 (2022).

K. L. Narayanan and R. Naresh, “Improved Security for Cloud Storage Using Elgamal Algorithms Authentication Key Validation,” 2023 International Conference for Advancement in Technology (ICONAT), Jan. 2023, doi: 10.1109/iconat57137.2023.10080619, 2023.

Downloads

Published

27.12.2023

How to Cite

Mageshwari, M. ., & Naresh, R. . (2023). An Efficient Secure and Privacy Cloud Auditing in Winternitz Signature Scheme. International Journal of Intelligent Systems and Applications in Engineering, 12(9s), 56–60. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4203

Issue

Section

Research Article