Skip to main content

A Novel Hybrid Approach Based on Filters to Ensure Cloud Storage Data Security

  • Conference paper
  • First Online:
Ambient Communications and Computer Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 356))

  • 519 Accesses

Abstract

The next-generation architecture of IT organization has been planned for cloud storage. We have proposed a new Hybrid-Secure Cloud Storage (HSCS) approach to ensure data protection during auditing in the cloud. The hybrid approach consists of integrating the Schnorr Elliptical Curve (SEC) framework with the Bloom Filter (BF). Finally, the BF is added to delete redundant keys in table entries to avoid duplication. The performance metrics for SCS and HSCS compared, in this HSCS would provide greater security than SCS, including Auditing-Time, Encryption-Time, Decryption Time, and Storage-Overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhao P, Yu J, Zhang H, Qin Z, Wang C (2020) Howto securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans Inf Forensics Secur 15:315–328

    Article  Google Scholar 

  2. Zheng Y, Duan H, Wang C (2019) Towards secure and efficient outsourcing of machine learning classification. In: European symposium on research in computer security. Springer, Berlin, pp 22–40

    Google Scholar 

  3. Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J (2019) One secure data integrity verification scheme for cloud storage. Futur Gener Comput Syst 96:376–385

    Article  Google Scholar 

  4. Hou H, Yu J, Hao R (2019) Cloud storage auditing with deduplication supporting different security levels according to data popularity. J Network Comput Appl 134:26–39

    Article  Google Scholar 

  5. Shen W, Qin J, Yu J, Hao R, Hu J (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Foren Secur 14(2):331–346

    Google Scholar 

  6. Li J, Li J, Xie D, Cai Z (2016) Secure auditing and deduplicating data in cloud. IEEE Trans Comput 65(8):2386–2396

    Article  MathSciNet  Google Scholar 

  7. Ding R, Zhong H, Ma J, Liu X, Ning J (2019) Lightweight privacy-preserving identity-based verifiable IoT-based health storage system. IEEE Internet Things J 6(5):8393–8405

    Article  Google Scholar 

  8. Joseph LM, Thomson Fredrik EJ (2020) Analysis of the recent security protocols in cloud storage system. Int J Grid Distrib Comput 13(06):1440–1452

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Joseph, L.M., Thomson Fredrik, E.J. (2022). A Novel Hybrid Approach Based on Filters to Ensure Cloud Storage Data Security. In: Hu, YC., Tiwari, S., Trivedi, M.C., Mishra, K.K. (eds) Ambient Communications and Computer Systems. Lecture Notes in Networks and Systems, vol 356. Springer, Singapore. https://doi.org/10.1007/978-981-16-7952-0_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-7952-0_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-7951-3

  • Online ISBN: 978-981-16-7952-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics