Abstract
Cloud storage performs a significant role in data sharing and data storage. The sharing of data is accessible over the internet. Protection has gotten to be a noticeable issue once the applying of the cloud data unit significantly developing in cloud computing in cloud computing. The benefits of the execution of these rising technologies have moved forward or changed administration models and progress application exhibitions from a different viewpoint. In any case, the exceptional developing volume of data sizes had to come about in numerous challenges in hones. The execution time of the data encryption is one of all the firm issues all through preparing and transmissions. A few current applications forsake data encryption to realize a versatile execution level companioning with protection issues. In this framework, we concentrate on efficient data protection. For that, a novel sensitive encryption approach is proposed with a sensitive file encryption strategy (SFES). Our proposed approach points to scramble the records which have more delicate data and utilize a sensitive file classification strategy. This methodology is intended to expand the security assurance scope by employing a sensitive encryption procedure that diminishes the time and distributed cloud storage space.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud. IEEE Internet Computing (2012)
C. Guan, K. Ren, F. Zhang, F. Kerschbaum, J. Yu, Symmetric-key based proofs of retrievability supporting public verification (2015)
W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu, R. Hao, Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium (2017)
S. Zhu, V. Saravanan, B. Muthu, Achieving data security and privacy across healthcare applications using cyber security mechanisms. Electron. Libr. 38(5/6), 979–995 (2020). https://doi.org/10.1108/el-07-2020-0219
T.N. Nguyen, B. Liu, N.P. Nguyen, J. Chou, Cyber security of smart grid: attacks and defenses, in ICC 2020—2020 IEEE International Conference on Communications (ICC) (Dublin, Ireland, 2020), pp. 1–6. doi: https://doi.org/10.1109/ICC40277.2020.9148850
H. Wang, D. He, S. Tang, Identity-based proxy oriented data uploading and remote data integrity checking in public cloud. IEEE Trans. Inf. Foren. Secur. (2016)
G. Ateniese, R. Burns, R. Curtmola, J. Herring, D. Song, Provable data possession at untrusted stores, in Proceedings of the 14th ACM Conference on Computer and Communications Security
A. Juel, B.S. Kaliski Jr, Pors: proofs of retrievability for large files, in Proceedings of the 14th ACM Conference on Computer and Communications Security
Q. Wang, C. Wang, K. Ren, Enabling public auditability and data dynamics for storage security in cloud computing (2011)
el-Khameesy N, Rahman HA, A proposed model for enhancing data storage security in cloud computing systems
C. Wang, S.S.M. Chow, Q. Wang, Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. (2013)
J. Yu, K. Ren, C. Wang, V. Varadharajan, Enabling cloud storage auditing with key-exposure resistance. IEEE Trans. Inf. Foren. Secur. (2015)
Y. Yu, M.H. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, G. Min, Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)
S.G. Worku, C. Xu, J. Zhao, X. He, Secure and efficient privacy preserving public auditing scheme for cloud storage (2014)
Y. Luo, M. Xu, D. Wang, Efficient integrity auditing for shared data in the cloud with secure user revocation (2015)
A. Fu, S. Yu, Y. Zhang, Npp: a new privacy-aware public auditing scheme for cloud data sharing with group users (2017). doi:https://doi.org/10.1109/TBDATA.2017.2701347
J. Yua, R. Hao, H. Xia, Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction (2018)
J. Hur, D. Koo, Y. Shin, K. Kang, Secure data deduplication with dynamic ownership management in cloud storage. IEEE Trans. Knowl. Data Eng. 28(11), 3113–3125 (2016)
Y. Li, Y. Yu, G. Min, W. Susilo, J. Ni, K.K.R. Choo, Fuzzy identity based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Sec. Comput. (2017)
H. Wang, Proxy provable data possession in public clouds. IEEE Trans. Serv. Comput. 6(4), 551–559 (2013)
H. Wang, D. He, J. Yu, Z. Wang, Incentive and unconditionally anonymous identity-based public provable data possession (2016)
J. Yu, H. Wang, Strong key-exposure resilient auditing for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 12(8), 1931–1940 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Udhaya Mugil, D., Metilda Florence, S. (2022). Efficient Sensitive File Encryption Strategy with Access Control and Integrity Auditing. In: Manogaran, G., Shanthini, A., Vadivu, G. (eds) Proceedings of International Conference on Deep Learning, Computing and Intelligence. Advances in Intelligent Systems and Computing, vol 1396. Springer, Singapore. https://doi.org/10.1007/978-981-16-5652-1_25
Download citation
DOI: https://doi.org/10.1007/978-981-16-5652-1_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5651-4
Online ISBN: 978-981-16-5652-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)