An Efficient Secure and Privacy Cloud Auditing in Winternitz Signature Scheme
Keywords:
Cloud Server, Security Audits, Third party Audit (TPA), Signature schemeAbstract
This cloud computing approach gives customers access to many platforms and delivers scalable, on-demand services whenever and wherever they are needed. The main issues in an outsourcing approach occur because users no longer possess access and ownership of their data, which means it is more challenging to conduct appropriate security audits. Winternitz Signature Scheme (WSS) is an extremely important cryptosystem. Not only may many signatures be compressed into a shorter signatures, but also guarantee the authenticity of each signature taking part in the combination by checking if the resultant aggregate signature is valid. Cloud server, Third Party Audit (TPA), and Data owners providers are all needed to complete the service. For the data owner, these processes include dividing the blocks in file, each encrypts of them, calculating a hash key, then merging them back together to produce a signature, and finally transmitting the result. The new audit method has used to cope with all these requirements. In this approach, the cloud server maintains a verifiable secure signature scheme, allowing for batch auditing. When it comes to practical arrangements, the efficiency and security of our approach are shown by the fact that it is reducing the computing and communication auditing process cost, which is particularly beneficial.
Downloads
References
A. Saranya, R. Naresh “Cloud Based Efficient Authentication for Mobile Payments using Key Distribution Method”, Journal of Ambient Intelligence and Humanized Computing, Springer, 02 January, 2021. DOI: 10.1007/s12652-020-02765-7
H. Tian, F. Nan, H. Jiang, C.C. Chang, J. Ning, Y. Huang “Public auditing for shared cloud data with efficient and secure group management”, Inf. Sci., 472 (2019), pp. 107-125.
R. Naresh, P. Vijayakumar, L. Jegatha Deborah, R. Sivakumar, “A Novel Trust Model for Secure Group Communication in Distributed Computing”, Special Issue for Security and Privacy in Cloud Computing, Journal of Organizational and End User Computing, IGI Global, Vol.32, No. 3, September 2020, Pp. 1-14. DOI: 10.4018/JOEUC.2020070101
Y. Sun, Q. Liu, X. Chen, X. Du “An adaptive authenticated data structure with privacy-preserving for big data stream in cloud” IEEE Trans. Inf. Forensics Secur., 15 (2020), pp. 3295-3310.
A. Saranya, R. Naresh “Efficient mobile security for E health care application in cloud for secure payment using key distribution”, Neural Processing Letters, Springer, 2021, DOI: 10.1007/s11063-021-10482-1
He M, “Certificateless provable data possession scheme for cloud-based smart grid data management systems”, IEEE Trans. Ind. Inf., 14 (3) (2018), pp. 1232-1241.
R. Naresh, M. Sayeekumar, G. M. Karthick, P. Supraja, “Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm”, Soft Computing, Springer, Vol.23, No. 8, 2019, Pp. 2561-2574. Doi: https://doi.org/10.1007/s00500-019-03790-1
X. Lu, Z. Pan, H. Xian ”An efficient and secure data sharing scheme for mobile devices in cloud computing” J. Cloud Computing., 9 (1) (2020), pp. 1-13.
P. Vijayakumar, R. Naresh, L. Jegatha Deborah, SK Hafizul Islam, “An efficient group key agreement protocol for secure P2P communication”, Security and Communication Networks, Wiley, Vol.9, No.17, pp.3952–3965, 2016. http://onlinelibrary.wiley.com/doi/10.1002/sec.1578/abstract
Wang J, Zhao Y et al., “Providing Privacy Preserving. In cloud computing”, International Conference on Test and Measurement, vol. 2, pp. 213–216, 2009.
P. Vijayakumar, R. Naresh, SK Hafizul Islam, L. Jegatha Deborah “An Effective Key Distribution for Secure Internet Pay-TV using Access Key Hierarchies”, Security and Communication Networks, Wiley, Vol.9, No.18, pp.5085–5097, 2016. http://onlinelibrary.wiley.com/doi/10.1002/sec.1578/full
Daniel, E., Vasanthi, N.A: LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Clust. Comput. 22(1), 1247–1258 (2019)
R. Naresh, M Meenakshi, G Niranjana, “Efficient study of Smart Garbage Collection for Ecofriendly Environment”, Journal of Green Engineering, Vol.10, No.1, pp.1-10, Feb 2020.
Wang, T, An alternative approach to public cloud data auditing supporting data dynamics. Soft Computing. 23(13), 4939–4953 (2019).
R Divya Mounika, R. Naresh, “The concept of Privacy and Standardization of Microservice Architectures in cloud computing”, European Journal of Molecular & Clinical Medicine, Vol 7, No 2, Pages 5349-5370, Dec 2020.
Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy Preserving Public Auditing for Secure Cloud Storage. http://eprint.iacr.org/2009/579.pdf
R. Naresh, AyonGupta, Sanghamitra, “MALICIOUS URL DETECTION SYSTEM USING COMBINED SVM AND LOGISTIC REGRESSION MODEL”, International Journal of Advanced Research in Engineering and Technology (IJARET), Vol.10, No.4, pp. 63-73, May 2020.
Priyadharshni, Geo Jenefer. G “Enhancing Data Security in Cloud Storage Auditing With Key Abstraction” Vo.2, Issue 2, Oct 2015.
M. Meenakshi, R Naresh, S Pradeep “Smart Home: Security and Acuteness in Automation of IOT Sensors”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 9, No. 1, pp. 3271- 3274, Nov 2019.
Liu, C., et al.: MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64(9), 2609–2622 (2014).
Chen Y C, Tso R, Mambo M, Huang K, Horng G (2015) Certificateless aggregate signature with efficient verification. Security and Communication Networks8(13):2232–2243
Li J, Yuan H, Zhang Y (2018) Cryptanalysis and improvement for certificateless aggregate signature. Fundamental Informatica
Mageshwari. M and Dr.R.Naresh,” Survey on Cloud Auditing by using Integrity Checking Algorithm and Key Validation Mechanism”, Proceedings of International Conference for information and communication Technology’-(ICTCS- 2022). Lecture Notes in Networks and Systems (LNNS, volume 396) DOI: 978-981-16-9967-2, 2022.
Mageshwari. M and R. Naresh,” Decentralized Data Privacy Protection and Cloud Auditing Security Management”, Proceedings of International Conference on Computing, Communication, and Intelligent Systems-(ICCCIS-2022). DOI:10.1109/ICCCIS56430.2022.10037676, 2023.
S. Sakthipriya, R. Naresh, Effective Energy Estimation Technique to Classify the Nitrogen and Temperature for Crop Yield Based Green House Application, Sustain. Comput. Inform. Syst.35 (2022).
K. L. Narayanan and R. Naresh, “Improved Security for Cloud Storage Using Elgamal Algorithms Authentication Key Validation,” 2023 International Conference for Advancement in Technology (ICONAT), Jan. 2023, doi: 10.1109/iconat57137.2023.10080619, 2023.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.