Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 248))

  • 2381 Accesses

Abstract

The rapid growth in the availability and popularity of cloud services allows on demand remote storage and the computation. Security and the privacy are the main concern to establish the trust cloud service; a solution is needed to achieve confidentiality and integrity of the user data. Many modern cryptographic techniques are available to protect the user’s data in the cloud storage. In this research, we proposed an asymmetric cryptographic technique for securing the data which encrypts the original message before placing it in the cloud storage. The proposed algorithm is providing the following securities: security in transit and security at rest. Our proposed protocol equipped with the security parameters like confidentiality, authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007), pp. 598–609 (2007)

    Google Scholar 

  3. Juels, A., Kaliski Jr., B.S.: Pors: Proofs of Retrievability for Large Files. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007), pp. 584–597 (2007)

    Google Scholar 

  4. Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Bowers, K.D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation. Report 2008/175, Cryptology ePrint Archive (2008)

    Google Scholar 

  6. Naor, M., Rothblum, G.N.: The Complexity of Online Memory Checking. In: Proc. 46th Ann. IEEE Symp. Foundations of Computer Science (FOCS 2005), pp. 573–584 (2005)

    Google Scholar 

  7. Wang, Q., Ren, K., Lou, W., Zhang, Y.: Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. In: Proc. IEEE INFOCOM, pp. 954–962 (April 2009)

    Google Scholar 

  8. Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proc. Fourth Int’l Conf. Security and Privacy in Comm. Networks (SecureComm 2008), pp. 1–10 (2008)

    Google Scholar 

  9. Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: Proc. 17th Int’l Workshop Quality of Service, IWQoS 2009 (2009)

    Google Scholar 

  10. Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 584–597. ACM, New York (2007)

    Chapter  Google Scholar 

  11. Amazon.com, Amazon web services (aws), http://aws.amazon.com/ (accessd on July 12, 2013)

  12. Zhang, L., Qin, B., Wu, Q., Zhang, F.: Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks 54(14), 2482–2491 (2010)

    Article  MATH  Google Scholar 

  13. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Sivaranjani, R., Lalitha Bhaskari, D., Avadhani, P.S.: Current Trends in Group Key Management. International Journal of Advanced Computer Science & Applications 2, 82–86 (2011)

    Google Scholar 

  15. Sivaranjani, R., Lalitha Bhaskari, D., Avadhani, P.S.: Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding. International Journal of Computer Applications 55(1) (October 2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Siva Ranjani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Ranjani, R.S., Bhaskari, D.L., Avadhani, P.S. (2014). Client-Side Encryption in Cloud Storage Using Lagrange Interpolation and Pairing Based Cryptography. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Advances in Intelligent Systems and Computing, vol 248. Springer, Cham. https://doi.org/10.1007/978-3-319-03107-1_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03107-1_52

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03106-4

  • Online ISBN: 978-3-319-03107-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics