IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Secure Crypto-Based Data Outsourcing Model For Monitoring The Smart Environment In Cloud

[Full Text]

 

AUTHOR(S)

A.S. Kalyana kumar, DR. T .Abdul razak

 

KEYWORDS

Blowfish Encryption, Cloud, MAC, Privacy Preservation, Smart Environment, Security, TPA, and k-anonymity

 

ABSTRACT

With the massive growth in cloud computing, the data owners are interested in outsourcing their databases to the cloud. But the owners and the service providers have some hesitations to trust this domain. Thus it is mandatory to provide data privacy for sensitive data.However, encrypting these private data before outsourcing makes data utilization a difficult task. Several encryption based algorithms were developed by researchers to transfer the data securely from end to end. But existing works focused mainly on single dimensional query or undergo insufficient security guarantee, etc. Thus to overcome above challenges and to monitor the data transmissions in smart environment, a Secured Crypto based Data Outsourcing Model (SCDOM) is proposed. This paper utilizes privacy preservation scheme for detecting anomalies, an enhanced Blowfish technique for implementing encryption and decryption. Here, while receiving user encrypted data, MAC- Message Authentication Code is generated and then transmitted to Third Party Auditor(TPA) for verification. Once keys are verified, the private details are transmitted. From the experimentation results, it is observed that proposed SCDOM provides enhanced results than the conventional methods.

 

REFERENCES

[1] Y. Yu, M. H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, et al., "Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage," IEEE Transactions on Information Forensics and Security, vol. 12, pp. 767-778, 2016.
[2] K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, "Security and privacy in smart city applications: Challenges and solutions," IEEE Communications Magazine, vol. 55, pp. 122-129, 2017.
[3] "http://image.ntua.gr/iva/datasets/ec1m/."
[4] U. Gupta, M. S. Saluja, and M. T. Tiwari, "Enhancement of Cloud Security and removal of anti-patterns using multilevel encryption algorithms," 2018.
[5] A. Choudhury, B. Roy, and S. K. Misra, "Data Integrity and Compression in Cloud Computing," International Journal of Computer Applications, vol. 168, 2017.
[6] S. Chaudhari and S. K. Pathuri, "A Comprehensive Survey on Public Auditing for Secure Cloud Storage," International Journal of Engineering & Technology, vol. 7, pp. 565-569, 2018.
[7] A. Jacobsson, M. Boldt, and B. Carlsson, "A risk analysis of a smart home automation system," Future Generation Computer Systems, vol. 56, pp. 719-733, 2016.
[8] P. Kumar, A. Braeken, A. Gurtov, J. Iinatti, and P. H. Ha, "Anonymous Secure Framework in Connected Smart Home Environments," IEEE Transactions on Information Forensics and Security, vol. 12, pp. 968-979, 2017.
[9] Y. Wang, Q. Wu, B. Qin, W. Shi, R. H. Deng, and J. Hu, "Identity-based data outsourcing with comprehensive auditing in clouds," IEEE Transactions on Information Forensics and Security, vol. 12, pp. 940-952, 2017.
[10] A. Alabdulatif, H. Kumarage, I. Khalil, and X. Yi, "Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption," Journal of Computer and System Sciences, 2017.
[11] W. Shen, G. Yang, J. Yu, H. Zhang, F. Kong, and R. Hao, "Remote data possession checking with privacy-preserving authenticators for cloud storage," Future Generation Computer Systems, 2017.
[12] X. Cao, H. Li, L. Dang, and Y. Lin, "A two-party privacy preserving set intersection protocol against malicious users in cloud computing," Computer Standards & Interfaces, vol. 54, pp. 41-45, 2017.
[13] J. Li, Z. Liu, X. Chen, F. Xhafa, X. Tan, and D. S. Wong, "L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing," Knowledge-Based Systems, vol. 79, pp. 18-26, 2015.
[14] Y. Shen, W. Yang, L. Li, and L. Huang, "Achieving fully privacy-preserving private range queries over outsourced cloud data," Pervasive and Mobile Computing, vol. 39, pp. 36-51, 2017.
[15] M. Jang, M. Yoon, and J.-W. Chang, "A New Query Integrity Verification Method with Cluster-based Data Transformation in Cloud Computing Environment," International Journal of Smart Home, vol. 9, pp. 225-238, 2015.
[16] H. Zhu, R. Lu, C. Huang, L. Chen, and H. Li, "An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud," IEEE Transactions on Vehicular Technology, vol. 65, pp. 7729-7739, 2016.
[17] F. Li, R. Shin, and V. Paxson, "Exploring privacy preservation in outsourced k-nearest neighbors with multiple data owners," in Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015, pp. 53-64.
[18] L. Malina and J. Hajny, "Efficient security solution for privacy-preserving cloud services," in Telecommunications and Signal Processing (TSP), 2013 36th International Conference on, 2013, pp. 23-27.
[19] G. Dili and V. Anu, "Maintaining Integrity and Security for the Data Shared in the Cloud," International Journal of Engineering Science, vol. 7693, 2016.
[20] M. M. Chandran, "Forward Secure Event Oriented Attribute based Anonymous Access Control for Cloud Computing," International Journal of Computational Intelligence Research, vol. 12, pp. 223-226, 2016.
[21] N. Kaaniche and M. Laurent, "Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms," Computer Communications, vol. 111, pp. 120-141, 2017/10/01/ 2017.