Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 18 von 251
2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT), 2022, p.160-165
2022
Volltextzugriff (PDF)

Details

Autor(en) / Beteiligte
Titel
Enabling Identity-Based Integrity Auditing and Data Sharing with Sensitive Information Hiding for Secure Cloud Storage
Ist Teil von
  • 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT), 2022, p.160-165
Ort / Verlag
IEEE
Erscheinungsjahr
2022
Quelle
IEEE Xplore
Beschreibungen/Notizen
  • With the increase in the data growth, where data storage becomes difficult if the user wants to store it on a local drive, which is why many organizations and people prefer storing their data on a cloud storage. With accessibility of cloud storage, people can remotely use cloud storage and avail data storage. Remote data integrity has been suggested as a way to ensure the integrity of data stored in clouds. The health care system is one example of cloud storage, and the cloud file there may include sensitive data. This sensitive information should not be shared with others. One solution would be to encrypt the whole file to avoid sensitive data sharing, but then this way the file would be unusable to others. The method for implementing data sharing with sensitive information disguised in remote data integrity audits is one topic that hasn't been looked into yet. This technique does this by creating a sanitizer that will clean up data blocks that correspond to the sensitive information in the file and change those signatures into valid ones for the cleansed file. These signatures are utilised during the integrity auditing procedure to confirm the cleaned-up file. As a result, this scheme allows files to be shared with others, while also maintaining data security by sanitizing blocks of sensitive data, with the data integrity auditing still able to be executed efficiently without any problems. Identity-based cryptography, which the proposed solution is built on, makes complex certificate administration simple. The proposed method is efficient and secure, according to the performance analysis and security analysis.
Sprache
Englisch
Identifikatoren
DOI: 10.1109/ICICICT54557.2022.9917653
Titel-ID: cdi_ieee_primary_9917653

Weiterführende Literatur

Empfehlungen zum selben Thema automatisch vorgeschlagen von bX