An Integrated M-Tree Approach for Securing Information in Public Auditing Clouds

Authors

  • Banoth Anantharam Research Scholar, Department of Computer Science and Engineering, School of Engineering, Sri Satya Sai University of Technology and Medical Sciences, Sehore(M.P), India
  • Rajesh Sharma Department of Computer Science and Engineering, School of Engineering, Sri Satya Sai University of Technology and Medical Sciences, Sehore(M.P), India
  • B. Kavitha Rani Department of Computer Science and Engineering, CMR Technical Campus, Hyderabad, Telangana, India

Keywords:

Message Digest, Hashing, Encryption, SSL Stripping, Proxy Server, Third Party Auditor

Abstract

In cloud computing one of the most important components is “IAM”, Identity and Access management tool to decide the rights of an individual over a resource. The identity is a property, which contains most sensitive and vital information in the encrypted format. Access represents the parameters like viewing and types of actions that a user can perform on the data. In general, integrity of the data is provided by the Third-Party Auditor (TPA) by generating the hash values for the encrypted blocks. It takes lot of time to audit every encrypted block by the TPA, this increases the cost of deployment. The cloud resources to provide the access management to the resources either use the regenerating code whenever it is being shared with others or using the proxy server. The proxy servers suffer from “SSL stripping”, i.e., an attacker hacks the victim’s information by sending the https URL. The proposed research aims to solve this problem by enhancing the Merkle Trees technique in which the blocks are secured using the hashing functions. These hashing functions are generated by combining the properties of MD5 and SHA-256. The proposed research combined these two algorithms because while transferring the information the communications should be faster which is served by MD5 whereas security should not be breached, i.e., data should be encrypted in short and more secured format, this is achieved by SHA-256.

Downloads

Download data is not yet available.

References

Ravikumar, G. ., Begum, Z. ., Kumar, A. S. ., Kiranmai, V., Bhavsingh, M., & Kumar, O. K. . (2022). Cloud Host Selection using Iterative Particle-Swarm Optimization for Dynamic Container Consolidation. International Journal on Recent and Innovation Trends in Computing and Communication, 10(1s), 247–253. https://doi.org/10.17762/ijritcc.v10i1s.5846

K., V. R. ., Yadav G., H. K. ., Basha P., H. ., Sambasivarao, L. V. ., Rao Y. V., Balarama K. ., & Bhavsingh , M. . (2023). Secure and Efficient Energy Trading using Homomorphic Encryption on the Green Trade Platform. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 345–360. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3421

Liu, J., Huang, K., Rong, H., Wang, H., & Xian, M. (2014). Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage. IEEE Transactions on Information Forensics and Security, 10(7), 1412–1428. https://doi.org/10.1108/TIFS.2014.2416688

Kumar, R., Nagar, G., Rajit, I., & Assistant, N. (2016). Multi-Cryptosystem based Privacy-Preserving Public Auditing for Regenerating Code based Cloud Storage. In International Journal of Computer Applications (Vol. 144, Issue 10).

Liu, M.-P., Jiang, R., & Kong, H.-F. (2017). Cryptanalysis and Countermeasures on Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage. http://creativecommons.org/licenses/by-nc/4.0/

Satya, A. L., Raju, I. R. K., Bhaskara Murthy, S. v, & Student, M. (n.d.). Privacy-Preserving Public Auditing For Regenerating-Code-Based Cloud Storage. www.jespublication.com

Anantharam, B., Sharma, N. ., & Rani, B. . (2023). Implementation of Dynamic Virtual Cloud Architecture for Privacy Data Storage. International Journal on Recent and Innovation Trends in Computing and Communication, 11(11s), 177–184. https://doi.org/10.17762/ijritcc.v11i11s.8084

Nalini, S. P., & Ponmagal, R. S. (2016). SECURE PRESERVING PUBLIC AUDITING FOR REGENERATING CODE BASED ON CLOUD STORAGE. In International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) (Vol. 21).

Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2016). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.

Vincent, T., & Krishnaveni, M. V. V. (N.D.). Ijesrt International Journal Of Engineering Sciences & Research Technology Robust And Efficient Privacy Preserving Public Auditing For Regenerating-Code-Based Cloud Storage. © International Journal of Engineering Sciences & Research Technology. Https://Doi.Org/10.4281/Zenodo.802828

Thokchom, S., & Kr Saikia, D. (2018). Privacy Preserving and Public Auditable Integrity Checking on Dynamic Cloud Data. International Journal of Network Security, 21(2), 221–228. https://doi.org/10.6622/IJNS.201802

Tang, X., Huang, Y., Chang, C. C., & Zhou, L. (2018). Efficient Real-Time Integrity Auditing with Privacy-Preserving Arbitration for Images in Cloud Storage System. IEEE Access, 7, 22008–22022. https://doi.org/10.1108/ACCESS.2018.2804040

Nayomi, B. D. D. ., Mallika, S. S. ., T., S. ., G., J. ., Laxmikanth, P. ., & Bhavsingh, M. . (2023). A Cloud-Assisted Framework Utilizing Blockchain, Machine Learning, and Artificial Intelligence to Countermeasure Phishing Attacks in Smart Cities. International Journal of Intelligent Systems and Applications in Engineering, 12(1s), 313–327. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3419

G, P., Dunna, N. R., & Kaipa , C. S. (2023). Enhancing Cloud-Based IoT Security: Integrating AI and Cyber security Measures. International Journal of Computer Engineering in Research Trends, 10(5), 26–32. https://doi.org/10.22362/ijcert.v10i5.43

Lakshmi, M. S. ., Ramana, K. S. ., Pasha, M. J. ., Lakshmi, K. ., Parashuram, N. ., & Bhavsingh, M. . (2022). Minimizing the Localization Error in Wireless Sensor Networks Using Multi-Objective Optimization Techniques. International Journal on Recent and Innovation Trends in Computing and Communication, 10(2s), 306–312. https://doi.org/10.17762/ijritcc.v10i2s.5948

Abou Bakary Ballo, & Diarra Mamadou. (2023). A Comprehensive Study of IoT Security Issues and Protocols . International Journal of Computer Engineering in Research Trends, 10(7), 8–14. https://doi.org/10.22362/ijcert.v10i7.858

Md. Saad Amin, Primitiva Morales-Romero, Miguel Chamorro-Atalaya, & M.Bhavsingh. (2023). A Novel User Interface Design for Enhancing Accessibility in Mobile Applications. International Journal of Computer Engineering in Research Trends, 10(8), 26–33. https://doi.org/10.22362/ijcert.v10i8.873

Guillermo Ramos-Salazar, Sabrina Rahaman, & Md. Amzad. (2023). A Machine Learning-based Approach for Detecting Malicious Activities in Cloud Computing Environments. International Journal of Computer Engineering in Research Trends, 10(9), 22–28. https://doi.org/10.22362/ijcert.v10i9.872

MAHDI, S. J. (2016). Preventing From Collusion Data Sharing Mechanism for Dynamic Group in the Cloud. International Journal of advanced Research in Computer Science, 2(7), 113-118.

Mallesh Goud, Pratika Malya.(2015). Dynamic Group data sharing framework on Cloud Servers. Macaw International Journal of Advanced Research in Computer Science and Engineering.1(1),16-20.

Lalchand G. Titare , Riya Qureshi (2016). Cloud based IoT for Agriculture in India. Macaw International Journal of Advanced Research in Computer Science and Engineering.2(12),5-10.

Pradeep G, P Satyanaryana, & S. Ramamoorthy. (2023). A Novel Cryptographic Protocol for Secure Data Sharing in Cloud Computing . International Journal of Computer Engineering in Research Trends, 10(11), 10–18. https://doi.org/10.22362/ijcert.v10i11.884

Downloads

Published

30.12.2023

How to Cite

Anantharam, B. ., Sharma, R. ., & Rani, B. K. . (2023). An Integrated M-Tree Approach for Securing Information in Public Auditing Clouds. International Journal of Intelligent Systems and Applications in Engineering, 12(9s), 557 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4408

Issue

Section

Research Article