Skip to main content

Efficient Sensitive File Encryption Strategy with Access Control and Integrity Auditing

  • Conference paper
  • First Online:
Proceedings of International Conference on Deep Learning, Computing and Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1396))

Abstract

Cloud storage performs a significant role in data sharing and data storage. The sharing of data is accessible over the internet. Protection has gotten to be a noticeable issue once the applying of the cloud data unit significantly developing in cloud computing in cloud computing. The benefits of the execution of these rising technologies have moved forward or changed administration models and progress application exhibitions from a different viewpoint. In any case, the exceptional developing volume of data sizes had to come about in numerous challenges in hones. The execution time of the data encryption is one of all the firm issues all through preparing and transmissions. A few current applications forsake data encryption to realize a versatile execution level companioning with protection issues. In this framework, we concentrate on efficient data protection. For that, a novel sensitive encryption approach is proposed with a sensitive file encryption strategy (SFES). Our proposed approach points to scramble the records which have more delicate data and utilize a sensitive file classification strategy. This methodology is intended to expand the security assurance scope by employing a sensitive encryption procedure that diminishes the time and distributed cloud storage space.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Computing (2012)

    Google Scholar 

  2. C. Guan, K. Ren, F. Zhang, F. Kerschbaum, J. Yu, Symmetric-key based proofs of retrievability supporting public verification (2015)

    Google Scholar 

  3. W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu, R. Hao, Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium (2017)

    Google Scholar 

  4. S. Zhu, V. Saravanan, B. Muthu, Achieving data security and privacy across healthcare applications using cyber security mechanisms. Electron. Libr. 38(5/6), 979–995 (2020). https://doi.org/10.1108/el-07-2020-0219

  5. T.N. Nguyen, B. Liu, N.P. Nguyen, J. Chou, Cyber security of smart grid: attacks and defenses, in ICC 2020—2020 IEEE International Conference on Communications (ICC) (Dublin, Ireland, 2020), pp. 1–6. doi: https://doi.org/10.1109/ICC40277.2020.9148850

  6. H. Wang, D. He, S. Tang, Identity-based proxy oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Foren. Secur. (2016)

    Google Scholar 

  7. G. Ateniese, R. Burns, R. Curtmola, J. Herring, D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security

    Google Scholar 

  8. A. Juel, B.S. Kaliski Jr, Pors: proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security

    Google Scholar 

  9. Q. Wang, C. Wang, K. Ren, Enabling public auditability and data dynamics for storage security in cloud computing (2011)

    Google Scholar 

  10. el-Khameesy N, Rahman HA, A proposed model for enhancing data storage security in cloud computing systems

    Google Scholar 

  11. C. Wang, S.S.M. Chow, Q. Wang, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. (2013)

    Google Scholar 

  12. J. Yu, K. Ren, C. Wang, V. Varadharajan, Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Foren. Secur. (2015)

    Google Scholar 

  13. Y. Yu, M.H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, G. Min, Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)

    Google Scholar 

  14. S.G. Worku, C. Xu, J. Zhao, X. He, Secure and efficient privacy preserving public auditing scheme for cloud storage (2014)

    Google Scholar 

  15. Y. Luo, M. Xu, D. Wang, Efficient integrity auditing for shared data in the cloud with secure user revocation (2015)

    Google Scholar 

  16. A. Fu, S. Yu, Y. Zhang, Npp: a new privacy-aware public auditing scheme for cloud data sharing with group users (2017). doi:https://doi.org/10.1109/TBDATA.2017.2701347

  17. J. Yua, R. Hao, H. Xia, Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction (2018)

    Google Scholar 

  18. J. Hur, D. Koo, Y. Shin, K. Kang, Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113–3125 (2016)

    Google Scholar 

  19. Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, K.K.R. Choo, Fuzzy identity based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Sec. Comput. (2017)

    Google Scholar 

  20. H. Wang, Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–559 (2013)

    Google Scholar 

  21. H. Wang, D. He, J. Yu, Z. Wang, Incentive and unconditionally anonymous identity-based public provable data possession (2016)

    Google Scholar 

  22. J. Yu, H. Wang, Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 12(8), 1931–1940 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Udhaya Mugil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Udhaya Mugil, D., Metilda Florence, S. (2022). Efficient Sensitive File Encryption Strategy with Access Control and Integrity Auditing. In: Manogaran, G., Shanthini, A., Vadivu, G. (eds) Proceedings of International Conference on Deep Learning, Computing and Intelligence. Advances in Intelligent Systems and Computing, vol 1396. Springer, Singapore. https://doi.org/10.1007/978-981-16-5652-1_25

Download citation

Publish with us

Policies and ethics