Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Network Coding and Signcryption for Cloud Data Integrity
Network Coding and Signcryption for Cloud Data Integrity
Network Coding and Signcryption for Cloud Data Integrity
Ebook223 pages1 hour

Network Coding and Signcryption for Cloud Data Integrity

Rating: 0 out of 5 stars

()

Read preview

About this ebook

The advent of cloud computing has revolutionized the way data is stored, processed, and shared. However, the security of cloud data remains a major concern due to the inherent vulnerabilities in cloud architecture. The paper "Network Coding and Signcryption for Cloud Data Integrity" authored by V.Balasubramanian explores the use of network coding and signcryption techniques to ensure the integrity of cloud data.

Network coding is a technique that enables efficient data transmission and error correction in networks. Signcryption, on the other hand, is a cryptographic technique that combines digital signature and encryption to provide data integrity, confidentiality, and authentication. The paper proposes the use of these two techniques together to provide a comprehensive solution for cloud data integrity.

The paper discusses the theoretical foundations of network coding and signcryption and their application in cloud computing. It also discusses the advantages of using network coding and signcryption over traditional cryptographic techniques such as symmetric and asymmetric encryption. The paper provides a detailed analysis of the computational complexity, efficiency, and resource utilization of the proposed technique.

The paper also discusses various aspects of cloud security such as data protection, data privacy, data confidentiality, and access control. It proposes the use of random number generation, key generation, and key management techniques to ensure the security of cloud data. The paper also discusses the issues of data transmission, storage, retrieval, sharing, backup, redundancy, fault tolerance, recovery time, service availability, quality of service, reliability, and scalability in cloud computing.

In conclusion, the paper "Network Coding and Signcryption for Cloud Data Integrity" provides a comprehensive solution for ensuring the integrity of cloud data. It proposes the use of network coding and signcryption techniques to provide data security, error correction, and information theory-based encryption. The proposed technique offers a high level of security, efficiency, and scalability and can be used in various applications of cloud computing.

LanguageEnglish
PublisherNoah Joan
Release dateJun 6, 2024
ISBN9798227388162
Network Coding and Signcryption for Cloud Data Integrity

Related to Network Coding and Signcryption for Cloud Data Integrity

Related ebooks

Intelligence (AI) & Semantics For You

View More

Related articles

Reviews for Network Coding and Signcryption for Cloud Data Integrity

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Network Coding and Signcryption for Cloud Data Integrity - Noah Joan

    ABSTRACT

    ––––––––

    Due to the expansion of internet and huge dataset, many organizations started to use cloud. Cloud computing moves the application software and databases to the centralized large data centres, where the management of the data and services may not be fully trustworthy. Cloud storage is one of the important services of cloud computing which allows the clients to store their data from local computing systems to the remote cloud. After outsourcing the data, owner has no physical control over remotely present data. To verify the data integrity, several efficient cryptographic techniques related to provable data possession are proposed to check the remote data integrity without downloading it from the cloud storage server.

    To reduce the computational cost at user side during the integrity verification of their data, the notion of public verifiability has been proposed. Confidentiality, integrity and availability of data stored in the cloud is one of the most important security aspects which needs to be addressed. Since the data is not controlled by clients, for this purpose, the existing cryptography techniques cannot be adopted directly. Therefore, clients are required to provide an efficient and effective audit service to check whether data is properly stored.

    In this thesis, to investigate this type of cloud storage security  issues, an efficient and secure data storage security protocol employing network coding and bilinear pairing has been proposed. The protocol ensured data availability and confidentiality through network codes and  bilinear pairing technique. The key component of our scheme is it support spot checking, and hence the scheme is lightweight. Also, the metadata used to verify the integrity of the data does not require knowledge of whole data,  hence preserves the privacy of the data. The scheme proposed also supports

    public verifiability; public verification allows Third Party Auditors (TPA) to verify data integrity in the cloud on behalf of the client. The  protocol  proposed also considers dynamic data, where the client is capable of updating the data on remote cloud servers, including modification, deletion and insertion. Through extensive security analysis, it has been demonstrated that the proposed scheme is secure and efficient through experimental  results, when compared with existing schemes.

    The next proposed scheme involves integrity checking for cloud IoT devices. The objective is to design an efficient signcryption scheme that reduces the cost and increases the efficiency of the system. An efficient identity based signcryption scheme that have less overheads is proposed to ensure data integrity in IoT environments. Also, an efficient certificateless signcryption scheme to avoid key escrow problem is proposed.

    Internet of Things (IoT) has drawn significant attention in recent years since it has made revolutionary changes in human life. The IoT enables the exchange of information in a wide variety of applications such as smart buildings, smart health, smart transport, and so on. These diverse application domains can be unified into a single entity referred as smart life. The rapid evolution of the IoT has pushed a race between cyber-criminals and security experts. As billions of connected things communicate with each other and can exchange sensitive information that may be leaked. Hence, strengthening  IoT’s security and preserving users’ privacy is a major challenge.

    The second part of our work involves an enhanced new certificateless signcryption technique which is proposed  by  employing bilinear pairings. The bilinear pairing can be implemented in the data owner. Since it is a one-time  operation as part of the setup phase.  Because of this,  the communication overhead is minimum, which greatly reduce the I/O  burden of cloud providers and increase bandwidth utilization. The cost of the

    pairing takes few milliseconds. Hence if needed, it can be performed in the CSP end. Signcryption achieves both encryption and digital signature at the same time. The cost of the computations involved and the overheads involved in the communication is lesser than the conventional sign-then-encrypt  method. Certificateless cryptosystem intends to solve the disadvantage of the identity-based cryptosystem key escrow problem which also simplifies the public key management. The scheme performance is also demonstrated to be more effective and efficient for smart devices. The proposed scheme fulfils public cipher text verifiability and satisfies in-distinguishability against adaptively chosen-cipher text attacks. It is also immune to existential un- forgeability against chosen message attacks.

    TABLE NO. TITLE PAGE NO.

    2.1 Erasure Code Encoding 36

    File Encoding Time 77

    Decoding of Files 78

    Repairing of Files 79

    Efficiency Comparison with other Identity 99

    Based Signcryption

    Efficiency Comparison 105

    FIGURE NO. TITLE PAGE NO.

    ––––––––

    Cloud Characteristics and Models 6

    Cloud Security Vulnerabilities and Solutions 8

    Data Security Vulnerabilities and Solutions 17

    Taxonomy of Data Integrity Schemes 27

    Proof of Retrieval based on Sentinel 31

    Merkle Hash Tree 32

    Erasure Coding 37

    Network Coding 38

    Linear combination of Coded Blocks 39

    Architecture for Data Integrity Checking 43

    Encoding of File (4,2) MDS Coding 45

    Data Repair 45

    Cloud Data Integrity Checking using Identity

    based Signcryption 48

    Cloud Data Storage Audit Architecture 50

    Setup Phase 52

    Verification Phase 55

    Framework for Data Integrity Verification Scheme using Network Coding for Cloud

    Clients 68

    Network Coding Scheme 72

    Graph Illustrating Spot Checking 74

    Encoding of Data Files 77

    Decoding of Data Files 78

    FIGURE NO. TITLE PAGE NO.

    Repairing of Files 80

    Meta Data Cost 80

    Signcryption Scheme (a) Signcryption Phase (b) Unsigncryption Phase 84

    Framework for Data Integrity Verification using Signcryption 88

    System Architecture for Identity Based

    Signcryption 92

    Framework for Certificateless Signcryption 100

    LIST OF SYMBOLS AND ABBREVIATIONS

    BLS - Boneh-Lynn-Shacham signature

    CIA - Confidentiality – Integrity - Availability CR - Challenge - Response

    CSP - Cloud Service Provider

    DIC - Data Integrity Checking

    DC - Data Consumer

    DO - Data Owner

    DP - Data Producer

    HVT - Homomorphic Verifiable Tags IaaS - Infrastructure as a Service MAC  -  Message Authentication Code MHT  -  Merkle Hash Tree

    PaaS - Platform as a Service

    PBC - Pairing-Based Cryptography PDP - Provable Data Possession PoR  -  Proof of Retrieval

    PPT - Probabilistic Polynomial Time RSA - Rivest-Shamir-Adelman

    SaaS - Software as a Service SLA - Service Level Agreement

    TPA - Trusted Third Party Auditor

    CHAPTER 1 INTRODUCTION

    CLOUD COMPUTING: AN OVERVIEW

    Cloud computing is an evolving computing model that provides a huge extent of computing and storage capacity to the clients provisioned as a facility over the internet in a pay-as-you-go pricing model,  where  the clients pay only according to the utilisation of their services (Mell & Grance 2011). According to Gartner, The worldwide public cloud services market  is  projected to grow 17.3 % in 2019 to total $206.2 billion, up from $175.8 billion in 2018. It also placed cloud computing in the top ten technologies and suggested it will be the future computing paradigm (Senyo et al. 2018). The clients can store large amount of data in cloud at a reasonably lower cost. By moving their data to the cloud, the clients can avoid the cost towards establishing the infrastructure framework and routine maintenance cost. The cloud not only represents a new business model and computing paradigm, but also it enables convenient, on-demand provisioning of computational and storage resources. The resources can be rapidly deployed with great efficiency (Foster et al. 2008).

    Cloud computing offers massive pool of resources and services that cloud users can use for storing and processing their data. It has  changed the  way by which infrastructures are designed in new computing age. It has enormously removed the start-up costs for new companies. It has transformed the IT industry where the services are delivered over the internet which  provides scalable and virtualised resources over the internet (Jin et al. 2011). In

    spite of the advantages the cloud provides new challenges related to data and computation security. Data is the fundamental asset we need to secure. The separation of data owner and their data raises security concern. Cloud employs shared environment for user and their data. The physical resources are virtualised and shared among many users, hence create new challenges for data security. Since the adaption of cloud computing is increasing, there is an  explicit and constant effort to evaluate the current trends in security for such technology. It considers problems already identified with possible solutions. Also, concerns are being raised about the security issues  through the adoption  of this new model (Bumpus 2013).

    Cloud characteristics

    The National Institute of Standards and Technology (NIST) has identified the following five essential characteristics which is given in the literature (Mell & Grance 2011; Xiao & Xiao 2013).

    i)  On-demand self-service: The service must be available  always. Also, the service received should be modifiable. The cloud client should

    Enjoying the preview?
    Page 1 of 1