Client-Side Encryption in Cloud Storage Using Lagrange Interpolation and Pairing Based Cryptography

  • R. Siva Ranjani
  • D. Lalitha Bhaskari
  • P. S. Avadhani
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 248)

Abstract

The rapid growth in the availability and popularity of cloud services allows on demand remote storage and the computation. Security and the privacy are the main concern to establish the trust cloud service; a solution is needed to achieve confidentiality and integrity of the user data. Many modern cryptographic techniques are available to protect the user’s data in the cloud storage. In this research, we proposed an asymmetric cryptographic technique for securing the data which encrypts the original message before placing it in the cloud storage. The proposed algorithm is providing the following securities: security in transit and security at rest. Our proposed protocol equipped with the security parameters like confidentiality, authentication.

Keywords

Client side Encryption Cloud storage bilinear map broadcast encryption Lagrange interpolation cloud data storage 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007), pp. 598–609 (2007)Google Scholar
  3. 3.
    Juels, A., Kaliski Jr., B.S.: Pors: Proofs of Retrievability for Large Files. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007), pp. 584–597 (2007)Google Scholar
  4. 4.
    Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Bowers, K.D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation. Report 2008/175, Cryptology ePrint Archive (2008)Google Scholar
  6. 6.
    Naor, M., Rothblum, G.N.: The Complexity of Online Memory Checking. In: Proc. 46th Ann. IEEE Symp. Foundations of Computer Science (FOCS 2005), pp. 573–584 (2005)Google Scholar
  7. 7.
    Wang, Q., Ren, K., Lou, W., Zhang, Y.: Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. In: Proc. IEEE INFOCOM, pp. 954–962 (April 2009)Google Scholar
  8. 8.
    Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proc. Fourth Int’l Conf. Security and Privacy in Comm. Networks (SecureComm 2008), pp. 1–10 (2008)Google Scholar
  9. 9.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: Proc. 17th Int’l Workshop Quality of Service, IWQoS 2009 (2009)Google Scholar
  10. 10.
    Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 584–597. ACM, New York (2007)CrossRefGoogle Scholar
  11. 11.
    Amazon.com, Amazon web services (aws), http://aws.amazon.com/ (accessd on July 12, 2013)
  12. 12.
    Zhang, L., Qin, B., Wu, Q., Zhang, F.: Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks 54(14), 2482–2491 (2010)CrossRefMATHGoogle Scholar
  13. 13.
    Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    Sivaranjani, R., Lalitha Bhaskari, D., Avadhani, P.S.: Current Trends in Group Key Management. International Journal of Advanced Computer Science & Applications 2, 82–86 (2011)Google Scholar
  15. 15.
    Sivaranjani, R., Lalitha Bhaskari, D., Avadhani, P.S.: Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding. International Journal of Computer Applications 55(1) (October 2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • R. Siva Ranjani
    • 1
  • D. Lalitha Bhaskari
    • 1
  • P. S. Avadhani
    • 1
  1. 1.Dept.of CS&SEAndhra UniversityVisakhapatnamIndia

Personalised recommendations