Abstract
The rapid growth in the availability and popularity of cloud services allows on demand remote storage and the computation. Security and the privacy are the main concern to establish the trust cloud service; a solution is needed to achieve confidentiality and integrity of the user data. Many modern cryptographic techniques are available to protect the user’s data in the cloud storage. In this research, we proposed an asymmetric cryptographic technique for securing the data which encrypts the original message before placing it in the cloud storage. The proposed algorithm is providing the following securities: security in transit and security at rest. Our proposed protocol equipped with the security parameters like confidentiality, authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable Data Possession at Untrusted Stores. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007), pp. 598–609 (2007)
Juels, A., Kaliski Jr., B.S.: Pors: Proofs of Retrievability for Large Files. In: Proc. 14th ACM Conf. Computer and Comm. Security (CCS 2007), pp. 584–597 (2007)
Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008)
Bowers, K.D., Juels, A., Oprea, A.: Proofs of Retrievability: Theory and Implementation. Report 2008/175, Cryptology ePrint Archive (2008)
Naor, M., Rothblum, G.N.: The Complexity of Online Memory Checking. In: Proc. 46th Ann. IEEE Symp. Foundations of Computer Science (FOCS 2005), pp. 573–584 (2005)
Wang, Q., Ren, K., Lou, W., Zhang, Y.: Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance. In: Proc. IEEE INFOCOM, pp. 954–962 (April 2009)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and Efficient Provable Data Possession. In: Proc. Fourth Int’l Conf. Security and Privacy in Comm. Networks (SecureComm 2008), pp. 1–10 (2008)
Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring Data Storage Security in Cloud Computing. In: Proc. 17th Int’l Workshop Quality of Service, IWQoS 2009 (2009)
Juels, A., Kaliski, B.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 584–597. ACM, New York (2007)
Amazon.com, Amazon web services (aws), http://aws.amazon.com/ (accessd on July 12, 2013)
Zhang, L., Qin, B., Wu, Q., Zhang, F.: Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks 54(14), 2482–2491 (2010)
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)
Sivaranjani, R., Lalitha Bhaskari, D., Avadhani, P.S.: Current Trends in Group Key Management. International Journal of Advanced Computer Science & Applications 2, 82–86 (2011)
Sivaranjani, R., Lalitha Bhaskari, D., Avadhani, P.S.: Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding. International Journal of Computer Applications 55(1) (October 2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Ranjani, R.S., Bhaskari, D.L., Avadhani, P.S. (2014). Client-Side Encryption in Cloud Storage Using Lagrange Interpolation and Pairing Based Cryptography. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. Advances in Intelligent Systems and Computing, vol 248. Springer, Cham. https://doi.org/10.1007/978-3-319-03107-1_52
Download citation
DOI: https://doi.org/10.1007/978-3-319-03107-1_52
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03106-4
Online ISBN: 978-3-319-03107-1
eBook Packages: EngineeringEngineering (R0)