Ensuring Optimized Storage with Data Confidentiality and Privacy-Preserving for Secure Data Sharing Model Over Cloud
Keywords:
Cloud Storage, Digital Media, Data Privacy, Data Compression, Data Security, Digital SignatureAbstract
This paper proposes privacy-preserving access control model for optimized storage over cloud. The main goal is to provide data security, privacy, integrity, and availability at a lower cost to cloud service providers while ensuring that users feel confident in trusting them. To achieve this, a secure authenticity scheme is proposed to protect data during storage and transfer over the cloud. The framework focuses on storage cost optimization while maintaining data security and authenticity. The proposed scheme compresses high-resolution images to reduce the storage size of the data by 60%. The data is then fragmented into multiple chunks, and these chunks are encrypted using the owner's private key, providing two layers of security. Only users with authority to the data can decrypt and reconstruct it into its original format. A signature is generated to check the integrity of data. If unauthorized users attempt to update data, the auditing process can identify the compromised data. Asymmetric keys are used, and when a user uploads data to the cloud, a digital signature is created with the user's private key. By implementing the suggested model, not only can the expenses associated with data storage be diminished through efficient data compression techniques, but it also introduces a well-defined data access protocol that prioritizes the preservation of data privacy. Experimental execution concludes that the proposed scheme has good performance over existing systems with a variety of aspects. The optimized storage and privacy-preserving access control model can be used to ensure secure data storage and sharing in collaborative cloud computing environments.
Downloads
References
Katarzyna KAPUSTA, Han QIU, and Gerard MEMMI LTCI, Telecom ParisTech, Paris, France “Secure Data Sharing with Fast Access Revocation through Untrusted Clouds” 978-1-7281-1542-9/19/$31.00 ©2019 IEEE.
Li Li, Jiayong Liub “SecACS: Enabling lightweight secure auditable cloud storage with data dynamics” 2214-2126/© 2020 Elsevier Ltd. All rights reserved.
Reyhaneh Rabaninejad, Seyyed Mahdi Sedaghat, Mohamoud Ahmadian Attari, Mohammad Reza Aref “An ID-Based Privacy-Preserving Integrity Verification of Shared Data Over Untrusted Cloud” K. N. Toosi University of Technology Department of Electrical Engineering Tehran, Iran, 978-1-7281-5937-9/20/$31.00 ©2020 IEEE
Premlata Singh, Sushil Kr. Saroj “A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage” Department of Computer Science & Engineering, Madan Mohan Malaviya University of Technology Gorakhpur, India 978-1-7281-5197-7/20/$31.00 ©2020 IEEE
Jian Wang, Kehua Wu, Chunxiao Ye, Xiaofeng Xia, Fei Ouyang ∗Colleage of Computer Science, Chongqing University, Chongqing, China “Improving Security Data Access Control for Multi-Authority Cloud Storage” 978-1-7281-4328-6/19/$31.00 ©2019 IEEE
Aritra Dutta, Rajesh Bose, Swamendu Kuma Chakraborty, Sandip Roy, Haraprasad Mondal, Computational science Brainware University, Kolkata India "Data Security Mechanism for Green Cloud", IEEE 2021
Ding ManJiang 1, Cao Kai 1, Wang ZengXi 2, Zhu LiPeng 3, 1. State Grid Jiangsu Tendering Co., Ltd, Nanjing, China 2. Jiangsu Electric Power Information Technology Co., Ltd, Nanjing, China 3. Global Energy Interconnection Research Institute Co., Ltd, Beijing, China, "Design of a Cloud Storage Security ncryption Algorithm for Power Bidding System", IEEE 2020
YANG Zhen, WANG Wenyu, HUANG Yongfeng, and LI Xing, Department of Electronic Engineering, Tsinghua University, Beijing 100084, China “Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage” 2019 Chinese Institute of Electronics. DOI:10.1049/cje.2018.02.017 ©2019 IEEE
Fei Chen, Fengming Meng, Tao Xiang, Hua Dai, Jianqiang Li, Jing Qin “Towards Usable Cloud Storage Auditing” 1045-9219 (c) 2020 IEEE
C.Jenifer Kamalin1, Dr.T.Arul Raj2, Dr.G.MuthuLakshmi3 1Research Scholar, 2, 3Assistant Professor 1,3Department of Computer Science & Engineering, Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli – 627 012 2Department of Computer Science, Sri Paramakalyani College, Alwarkurichi, Tenkasi – 627 412, “Comparative Analysis for Dct, Dwt Image Compression Performed with Huffman, Run Length and Lzw Encoding”, NTERNATIONAL JOURNAL OF SPECIAL EDUCATION Vol.37, No.3, 2022
SI HAN, KE HAN, AND SHOUYI ZHANG Department of Science and Technology, China University of Political Science and Law, 102249 China “A Data Sharing Protocol to Minimize Security and Privacy Risks of Cloud Storage in Big Data Era” 2169-3536 2019 IEEE.
Leyou Zhang, Yilei Cui , and Yi Mu , Senior Member, IEEE “Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing” 1937-9234 © 2019 IEEE
T. A. Mohanaprakash, Dr.J.Andrews Department of CSE, Sathyabama Institute of Science and Technology, Chennai 600119, Tamilnadu, India “Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm” 978-1-7281-1576-4/19/$31.00 ©2019 IEEE
YE TAO, PENG XU, and HAI JIN, National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab “Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage” 10.1109/ACCESS.2019.2962600, IEEE Access
Zhuoran Ma, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Tengfei Yang, School of Cyber Engineering, Xidian University, Xi'an 710071, China “Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation” 978-1-5386-8088-9/19/$31.00 ©2019 IEEE
Wenxiu Ding, Member, IEEE, Rui Hu, Zheng Yan, Senior Member, IEEE, Xinren Qian, Robert H. Deng, Fellow, IEEE, Laurence T. Yang, Senior Member, IEEE, and Mianxiong Dong, Member, IEEE “An Extended Framework of Privacy-Preserving Computation with Flexible Access Control” 1932-4537 (c) 2019 IEEE
HAN YU, XIUQING LU, AND ZHENKUAN PAN, College of Computer Science and Technology, Qingdao University, Qingdao 266071, China, “An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing” r 10.1109/ACCESS. 2020 IEEE
Nikolaos Doukas, Oleksandr P. Markovskyi, Nikolaos G. Bardis Department of Mathematics and Engineering Science, Hellenic Military Academy, Vari – 16673, Greece “Hash function design for cloud storage data auditing” 0304-3975/© 2019 Elsevier
Nureni Ayofe Azeez, Charles Van der Vyver School of Computer Science and Information Systems, Faculty of Natural and Agricultural Sciences, Vaal Triangle Campus, North-West University, South Africa. “Security and privacy issues in e-health cloud-based system: A comprehensive content analysis” 1110-8665/2018 Production and hosting by Elsevier
Jianghong Wei , Wenfen Liu, and Xuexian Hu “Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage” IEEE SYSTEMS JOURNAL, VOL. 12, NO. 2, JUNE 2018
Zhan Qin, Jian Weng, Yong Cui, Kui Ren, “Privacy-preserving Image Processing in the Cloud” 10.1109/MCC.2018. IEEE
Kaiping Xue, Senior Member, IEEE, Weikeng Chen, Wei Li, Jianan Hong, Peilin Hong “Combining Data Owner-side and Cloud-side Access Control for Encrypted Cloud Storage” 1556-6013 (c) 2018 IEEE
Jianting Ning, Zhenfu Cao, Senior Member, IEEE, Xiaolei Dong, Kaitai Liang, Member, IEEE, Lifei Wei, and Kim-Kwang Raymond Choo, Senior Member, IEEE “CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage” 1939-1374 (c) 2017 IEEE
Cong Wang, Qian Wang, and Kui Ren, Wenjing Lou Department of ECE Illinois Institute of Technology , Department of ECE Worcester Polytechnic Institute “Ensuring Data Storage Security in Cloud Computing” 978-1-4244-3876-1/09/$25.00 ©2009 IEEE
Cong Wang, Student Member, IEEE, Qian Wang, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Ning Cao, and Wenjing Lou, Senior Member, IEEE, “Toward Secure and Dependable Storage Services in Cloud Computing” 1939-1374/12/$31.00 2012 IEEE
Syam Kumar P, Subramanian R Department of Computer Science, School of Engineering & Technology Pondicherry University, Puducherry-605014, India,“An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011
CONG WANG1 (Member, IEEE), BINGSHENG ZHANG2 (Member, IEEE), KUI REN2 (Senior Member, IEEE), AND JANET M. ROVEDA3 (Senior Member, IEEE) Department of Computer Science, City University of Hong Kong, Hong Kong “Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud” IEEE TRANSACTIONS ON CLOUD COMPUTING VOL:1 NO:1 YEAR 2013
Cong Wang, Member, IEEE, Sherman S.M. Chow, Qian Wang, Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou, Senior Member, IEEE, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY 2013
Kan Yang, Student Member, IEEE, Xiaohua Jia, Senior Member, IEEE, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing”, 1045-9219/12/$31.00 © 2012 IEEE
Boyang Wang, Student Member, IEEE, Baochun Li, Senior Member, IEEE, and Hui Li, Member, IEEE “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, JANUARY-MARCH 2014
HUAQUN WANG1, 2 1 Jiangsu Key Laboratory of Big Data Security & Intelligent Processing, School of Computer Science, Nanjing University of Posts and Telecommunications, “Anonymous Data Sharing Scheme in Public Cloud and Its Application in E-health Record” 2169-3536 (c) 2018 IEEE
R.Swathi, T.Subha, Associate Professor, Department of Information Technology, Sri Sairam Engineering College, Chennai, swathi.marthandan@gmail.com, subharajan@gmail.com, “ENHANCING DATA STORAGE SECURITY IN CLOUD USING CERTIFICATELESS PUBLIC AUDITING” 978-1-5090-6221-8/17/$31.00 c 2017 IEEE
Nelmiawati Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia mia@polibatam.ac.id, Wahyudi Arifandi Department of Informatics Engineering Politeknik Negeri Batam Batam, Indonesia wahyudi.arifandi@gmail.com,“A Seamless Secret Sharing Scheme Implementation for Securing Data in Public Cloud Storage Service” 978-1-5386-8066-7/18/$31.00 ©2018 IEEE
Salunke M. D, Kumbharkar P. B; Kumar, P. (2021). A Proposed Methodology to Mitigate the Ransomware Attack. https://doi.org/10.3233/apc210173.
M.D.Salunke, Kumbharkar P. B; SharmaYogesh Kumar. (2020). Proposed Methodology to Prevent a Ransomware Attack. International Journal of Recent Technology and Engineering (IJRTE), 9(1), 2723–2725.
Subhash G. Rathod, R N khobragade, Vilas Thakare, Sushama L. Pawar. (2022). Security for Shared Data Over Public Cloud for Maintaining Privacy. Mathematical Statistician and Engineering Applications, 71(4), 7167–7173. Retrieved from https://www.philstat.org/index.php/MSEA/article/view/1336
Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., &Pawar,
S. (2022, September). Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-6). IEEE.
Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., Pawar, S. (2022, September). Model for Efficient Data Storage on Public Cloud. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-5). IEEE.
Subhash Gulabrao Rathod, Dr.K.H.Walse, Dr. R N khobragade, Dr. Vilas Thakare , &Sushama L. Pawar. (2022). PRESERVING PRIVACY & MAINTAINING SECURITY FOR SHARED DATA OVER PUBLIC CLOUD: A SURVEY. International Journal Of Advance Research And Innovative Ideas In Education, 8(3), 4971-4976.
Dhanwanth, B. ., Saravanakumar, R. ., Tamilselvi, T. ., & Revathi, K. . (2023). A Smart Remote Monitoring System for Prenatal Care in Rural Areas. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 30–36. https://doi.org/10.17762/ijritcc.v11i3.6196
Kanna, D. R. K. ., Muda, I. ., & Ramachandran, D. S. . (2022). Handwritten Tamil Word Pre-Processing and Segmentation Based on NLP Using Deep Learning Techniques. Research Journal of Computer Systems and Engineering, 3(1), 35–42. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/39
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.