Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf ·...

8
© 2017, IJCERT All Rights Reserved Page | 392 Impact Factor Value: 4.029 ISSN: 2349-7084 International Journal of Computer Engineering In Research Trends Volume 4, Issue 9, October-2017, pp. 392-399 www.ijcert.org Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud 1 Hafsa Fatima Amreen, 2 Ms. FirdousRehana, 3 Dr. G.S.S Rao 1 Pursuing MTech(CSE), 2 Assistant Professor ,3 Professor & HOD 1,2,3 Nawab Shah Alam Khan College of Engineering and Technology, Hyd Email:[email protected],[email protected],[email protected] ------------------------------------------------------------------------------------------------------------------ Abstract: Many consumers wish to reserved their knowledge publicly cloud server (pcs). Along with the immersive evolution of cloud computing. There is a drawback within the security thus this security problem needs to be resolved to help purchasers to endeavor their knowledge in pcs. When pcs approach is incommodious for the consumer to the method the info the consumer can become envoy its proxy and so transfer them. There’s Associate in nursing another responsibility drawback referred to as remote knowledge integrity checking cloud storage publicly. It permits the consumer to examine whether or not their outsourced knowledge is unbroken flawless while not downloading the fundamental experience. From this security drawback, we tend to propose unique remote knowledge integrity. Checking and proxy originated knowledge uploading on identity-based publicly cloud employing a linear pairingripu-IDC protocol is represented. Supported the hardness of Diffie dramatist drawback the ripper- IDC protocol is assured. The particular ripe-IDC protocol is additionally coherent and pliant. Depends on the initial consumer authorization. The planned ripu-IDC will notice confidential remote knowledge integrity checking, emisory remote knowledge integrity checking and public remote knowledge integrity checking. Key Words: Public Cloud Server, Integrity Checking, BilinearPairing, Coherent, And Pliant. ------------------------------------------------------------------------------------------------------------------ 1. Introduction A great deal of information is originated with the sudden growth desires a lot of resources and a lot of space for storing. Today the cloud computing becomes very talked-about, and it satisfies all the applying cravings and necessities and developing speedily. Cloud computing has become a big technology that surpasses all different older computing technology it provides varied favored compared to previous computing technology.It additionally offers various sorts of services to its users. Storage as a service is one amongst the services offered by cloud infrastructure. Like storage, knowledge security, and computing, etc. Relieved the freight of storage management by mistreatment public cloud platform and additionally freelance geographical location access by universal knowledge. Thus many consumers wish to store and method their expertise by the remote cloud automatic data processing system. LONG with the speedy development of computing and communication

Transcript of Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf ·...

Page 1: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

© 2017, IJCERT All Rights Reserved Page | 392

Impact Factor Value: 4.029 ISSN: 2349-7084 International Journal of Computer Engineering In Research Trends Volume 4, Issue 9, October-2017, pp. 392-399 www.ijcert.org

Proxy Cryptography Based on Data Uploading

and Data Integrity in Cloud 1Hafsa Fatima Amreen, 2 Ms. FirdousRehana,3 Dr. G.S.S Rao

1Pursuing MTech(CSE),

2Assistant Professor

,3Professor & HOD

1,2,3Nawab Shah Alam Khan College of Engineering and Technology, Hyd

Email:[email protected],[email protected],[email protected]

------------------------------------------------------------------------------------------------------------------

Abstract: Many consumers wish to reserved their knowledge publicly cloud server (pcs). Along with the

immersive evolution of cloud computing. There is a drawback within the security thus this security

problem needs to be resolved to help purchasers to endeavor their knowledge in pcs. When pcs

approach is incommodious for the consumer to the method the info the consumer can become envoy its

proxy and so transfer them. There’s Associate in nursing another responsibility drawback referred to as

remote knowledge integrity checking cloud storage publicly. It permits the consumer to examine whether

or not their outsourced knowledge is unbroken flawless while not downloading the fundamental

experience. From this security drawback, we tend to propose unique remote knowledge integrity.

Checking and proxy originated knowledge uploading on identity-based publicly cloud employing a linear

pairingripu-IDC protocol is represented. Supported the hardness of Diffie dramatist drawback the ripper-

IDC protocol is assured. The particular ripe-IDC protocol is additionally coherent and pliant. Depends on

the initial consumer authorization. The planned ripu-IDC will notice confidential remote knowledge

integrity checking, emisory remote knowledge integrity checking and public remote knowledge integrity

checking.

Key Words: Public Cloud Server, Integrity Checking, BilinearPairing, Coherent, And Pliant.

------------------------------------------------------------------------------------------------------------------

1. Introduction

A great deal of information is originated with the

sudden growth desires a lot of resources and a lot of

space for storing. Today the cloud computing

becomes very talked-about, and it satisfies all the

applying cravings and necessities and developing

speedily. Cloud computing has become a big

technology that surpasses all different older

computing technology it provides varied favored

compared to previous computing technology.It

additionally offers various sorts of services to its

users. Storage as a service is one amongst the

services offered by cloud infrastructure. Like storage,

knowledge security, and computing, etc.

Relieved the freight of storage management by

mistreatment public cloud platform and additionally

freelance geographical location access by universal

knowledge. Thus many consumers wish to store and

method their expertise by the remote cloud automatic

data processing system. LONG with the speedy

development of computing and communication

Page 2: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,

International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.

© 2017, IJCERT All Rights Reserved Page | 393

technologies, a superb deal of information unit

generated. This Brobdingnagian information needs

further durable computation resource and greater

house for storing. Over the last years. Loud

computing satisfies the applying wants and grows

quickly. It takes the information processes a service,

like storage, computing, information security, etc. By

mistreatment, the final public cloud platform, the

shopper's unit mitigated off. Thus, further and extra

purchasers would adore to store and methodology

their information by mistreatment the remote cloud

system.

In public cloud computing, the patrons store their

Brobdingnagian knowledge inside the remote public

cloud servers. Since the keep information is outside

of the management of the patrons, it entails the

security risks regarding confidentiality, integrity, and

convenience of data and repair. Remote information

integrity checking may be a primitive which may be

accustomed persuade the cloud shoppers that their

information is unbroken intact. In some special cases,

the info owner could also be restricted to access the

general public cloud server; the info owner can

delegate the task of information process and

uploading to the third party, for example, the proxy.

On the opposite facet, the remote knowledge integrity

checking protocol should be economical to create it

appropriate for capacity-limited finish devices.

A. Motivation in exceedingly public cloud

surroundings, most purchasers transfer their

knowledge to PCS and check their remote data’s

integrity by the net. once the consumer is a private

manager, some practical issues can happen. If the

manager is suspected of being concerned with the

industrial fraud, we are quarantined by the police.

throughout the amount of investigation, the manager

is restricted to access the network to protect against

collusion. But, the manager’s legal business can

proceed throughout the amount of investigation. once

an outsized of information is generated, World

Health Organization will facilitate him method this

knowledge? If these data can't be processed simply in

time, the manager can face the loss of economic

interest. To forestall the case happening, the manager

has to delegate the proxy to method its information,

for instance, his secretary. But, the manager won't

hope others can perform the remote information

integrity checking. Public checking will incur some

danger of unseaworthy the privacy. for example, the

keep information volume is detected by the malicious

verifiers. once the uploaded information volume is

confidential, personal remote information integrity

checking is important. Although the secretary has the

ability to a technique and transfers the information to

the manager, he still cannot check the manager’s

remote information integrity unless the manager

delegates him. We tend to tend to make your mind up

to the secretary as a result of the proxy of the

manager. In PKI (public key infrastructure), remote

information integrity checking protocol will perform

the certificate management. once the manager

delegates some entities to perform the remote

information integrity checking, it will incur intensive

overheads since the supporter will check the

certificate once it checks the remote information

integrity. In PKI, the intensive overheads come back

from the various certificate verification, certificates

generation, delivery, revocation, renewals, etc.

publicly cloud computing, the highest devices might

need low computation capability, like mobile, iPad,

etc. Identity-based public key cryptography can

eliminate the troublesome certificate management.

thus on extend the efficiency, identity-based proxy-

oriented information uploading and remote

information integrity checking square measure

further engaging. Thus, it will be essential to review

the ID-PUIC protocol. In 1984 Shamir [41] asked for

a public key secret writing theme inside that the final

public secret's typically Associate in Nursing

absolute string. In such a topic their square measure

four algorithms:

(1) Setup generates System International parameters

and a master-key,

(2) extract uses the master-key to come back up with

the private key resembling Associate in Nursing

absolute public key string ID ∈∗,

(3) Cipher encrypts messages victimization the final

public key ID, and

(4) Rewrite decrypts messages victimization the

corresponding personal key. Shamir’s original

motivation for identity-based secret writing was to

alter certificate management in e-mail systems.

Page 3: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,

International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.

© 2017, IJCERT All Rights Reserved Page | 394

once Alice sends email to Bob at [email protected]

she simply encrypts her message mistreatment the

final public key string “[email protected].” There

isn't any wish for Alice to induce Bob’s public key

certificate. Once Bob receives the encrypted email,

he contacts a third party that we tend to tend to make

your mind up to the Private Key Generator (PKG).

Bob attests himself to the PKG inside an equivalent

approach he would attest himself to a CA and obtains

his key from the PKG. Bob can then scans his e-mail.

Note that not like the current secure e-mail

infrastructure, Alice can send encrypted email to Bob

although Bob has not nonetheless started his public

key certificate. to boot, note that key legal document

is inherent in identity-based e-mail systems: the PKG

is tuned into Bob’s key. We tend to tend to debate

key revocation, however as several new applications

for IBE schemes inside following section. Since the

matter was shown in 1984 their square measure

several proposals for IBE schemes [11, 45, 31, 25]

(see to boot [33, p. 561]). However, none of these

square measure completely satisfactory. Some

solutions would like that users not conspire. Different

solutions would like the PKG to pay a prolonged time

for each personal key generation request. Some

solutions would like tamper-resistant hardware. it's

truthful to say that until the ends up in [5]

constructing a usable IBE system was Associate in

Nursing open drawback. Apparently, the connected

notion of Associate in the nursing identity-based

signature and authentication schemes, to boot

introduced by Shamir [41], does have satisfactory

solutions [15, 14]. During this paper, we tend to tend

to propose a purposeful identity-based secret writing

theme. The performance of our system is cherished

the performance of ElGamal secret writing in F ∗P.

the protection of our system relies on a natural analog

of the method Diffie-Hellman assumption.

2. Related Work

There exist many different security problems inside

the cloud computing [1], [2]. This paper depends on

the analysis results of proxy cryptography, identity-

based public key cryptography and remote

information integrity checking cloud publicly. In

some cases, the cryptographical operation goes to be

delegated to the third party, for example, proxy.

Thus, we've to use the proxy cryptography. Proxy

cryptography could also be a vital cryptography

primitive. In 1996, Mambo et al. projected the notion

of the proxy cryptosystem [3]. Once the additive

pairings unit brought into the identity-based

cryptography, identity-based cryptography becomes

economical and wise. Since identity-based

cryptography becomes further economical as a result

of it avoids of the certificate management, further and

extra specialist’s unit apt to examine identity-based

proxy cryptography. In 2013, Yoon et al. projected

associate ID-based proxy signature theme with

message recovery [4]. Chen et al. projected a proxy

signature theme and a threshold proxy signature

theme from the Weil pairing [5].

By combining the proxy cryptography with secret

writing technique, some proxy re-encryption schemes

unit planned. Liu et al. formalize and construct the

attribute-based proxy signature [6]. Guo et al. given a

non-interactive accountant (chosen-plaintext attack)-

secure proxy re-encryption theme, that is resistant to

collusion attacks info re-encryption keys [7]. Many

completely different concrete proxy re-encryption

schemes and their applications are also projected [8-

10].

Cloud computing is associate organic process new

model for distributed computing consisting of

centralized information centers that offer resources

for massively ascendible units of computing. This

machine facilities unit delivered as a service to users

over Associate in nursing associate insecure medium

just like the internet and can be bridged to wireless

packet information networks. A client of a cloud

provider can address changes in demand for its

method needs by replicating applications inside the

cloud to many runtime instances, and by running

them on cloud servers in a concurrent fashion.

Unforeseen burst demands like flash traffic on a web

server may even be met automatically whereas not

noticeable delay. The patron does not have to be

compelled to incur a high capital expense up front in

anticipation of future application usage patterns

which can be powerful to predict accurately, and can

otherwise cause outages if left unaddressed; excess

capacity and idle cycles unit avoided. The easy

quantifiability of cloud applications finishes up in

civil rights of benefits to firms big and tiny.

Page 4: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,

International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.

© 2017, IJCERT All Rights Reserved Page | 395

3. Recent Method In public cloud setting, most shoppers transfer their

info to Public Cloud Server (PCS) and check their

remote data’s integrity by the online. Once the patron

could be a personal manager, some wise problems

will happen. If the manager is suspected of caring

with the business fraud, we tend to square measure

planning to be isolated by the police. Throughout the

number of the investigation, the manager goes to be

restricted to access the network thus on defend

against collusion. But, the manager’s legal business

will prolong throughout the number of the

investigation. Once Associate in Nursing outsized of

information is generated, UN agency can facilitate

him methodology this information? If this knowledge

cannot be processed merely in time, the manager will

face the loss of economic interest. Thus on forestall

the case happening, the manager should delegate the

proxy to methodology its info, for example, his

secretary. But, the manager will not hope others have

the flexibleness to perform the remote info integrity

checking.

Public checking will incur some danger of leaky the

privacy. For example, the keep info volume could

also be detected by the malicious verifiers. Once the

uploaded info volume is confidential, personal

remote info integrity checking is very important.

Although the secretary has the flexibleness to a

technique and transfers the information to the

manager, he still cannot check the manager’s remote

info integrity unless the manager delegates him.

We've got an inclination to call the secretary as a

result of the proxy of the manager. In PKI (public key

infrastructure), remote info integrity checking

protocol will perform the certificate management.

Once the manager delegates some entities to perform

the remote info integrity checking, it'll incur intensive

overheads since the protagonist can check the

certificate once it checks the remote info integrity

In public cloud, remote info integrity checking is

associate vital security drawback. Since the clients’

Brobdingnagian info is outside of their management,

the clients’ info may even be corrupted by the

malicious cloud server despite by alternative or

accidentally. Thus on agitating the novel security

drawback, some economic models square measure

given. In 2007, Tennesee al. planned demonstrable

info possession (PDP) paradigm [11]. In PDP model,

the checker can check the remote info integrity

whereas not retrieving or downloading the full

knowledge. The checker can perform the remote info

integrity checking by maintaining small knowledge.

After that, some dynamic PDP model and protocols

square measure designed [12–16]. Following

Atenieseet et al. pioneering work, much remote info

integrity checking models and protocols square

measure planned [17]– [19]. In 2008, proof of

retrievability (POR) theme was planned by

Shachamet al. [20]. POR may be a stronger model

that makes the checker not entirely check the remote

info integrity but to boot retrieve the remote info.

Many POR schemes square measure planned [21]–

[26]. In some cases, the buyer may delegate the

remote info integrity checking task to the third party.

In cloud computing, the third party auditing is

indispensable [27–30]. By mistreatment cloud

storage, the patrons can access the remote info with

freelance geographical locations. The tip devices may

even be mobile and restricted in computation and

storage.

4. Proposed Work In public cloud, this paper focuses on the identity-

based proxy-oriented info uploading and remote info

integrity checking. By victimization identity-based

public key discipline, our planned ID-PUIC protocol

is economical since the certificate management is

eliminated. ID-PUIC is additionally a novel proxy-

oriented info uploading and remote info integrity

checking model publicly cloud. We tend to tend to

tend to produce the formal system model and security

model for ID-PUIC protocol. Then, supported the

linear pairings, we tend to tend to tend to style the

first concrete ID-PUIC protocol. Within the random

oracle model, our designed ID-PUIC protocol is

incontrovertibly secure. Supported the initial client’s

authorization, our protocol will notice personal

checking, delegated checking and public checking.

A. Concrete ID-PUIC Protocol

Page 5: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,

International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.

© 2017, IJCERT All Rights Reserved Page | 396

Concrete ID-PUIC protocol contains four procedures:

Setup, Extract, Proxy-key generation, TagGen, and

Proof. Thus on imply the intuition of our

construction, the concrete protocol’s vogue is

delineated in Fig.1 First, Setup is performed and to

boot the system parameters unit generated. Supported

the generated system parameters, the other

procedures unit performed as Fig.1.It's delineated

below: (1) within the 0.5 Extract, once the entity’s

identity is input, KGC generates the entity’s key.

Especially, it will make the personal keys for the

patron and boot the proxy. (2) Within the 0.5 Proxy-

key generation, the first shopper creates the warrant

and helps the proxy generate the proxy key. (3)

Within the 0.5 TagGen, once the data block is input,

the proxy generates the block’s tag and transfer

block-tag pairs to PCS. (4) Within the 0.5 Proof, the

first shopper O interacts with PCS.

B. Personal Checking, Delegated

Checking, And Public Checking

Our planned ID-PUIC protocol satisfies the private

checking, delegated checking and free checking.

Inside the remote knowledge integrity checking

procedure, R1, Ro, Rp unit indispensable. Thus, the

process will solely be performed by the entity

administrative unit has R1, Ro, Rp. In general, since

R1, Ro, Rp unit unbroken secret by the first shopper,

our protocol will solely be performed by the early

shopper. Thus, it's personal checking. In some cases,

the primary shopper cannot check its remote

knowledge integrity, such as, he's taking a vacation

or in jail or within the track, etc. Thus, it's planning to

delegate the third party to perform the ID-PUIC

protocol. it ought to be the third auditor or the proxy

or varied entities. The first shopper sends R1, Ro, and

Rp to the delegated third party. The delegated third

party has the liability to perform the ID-PUIC

protocol. Thus, it's the property of delegated

checking. On the opposite hand, if the first shopper

makes R1, Ro, Rp public, any entity has the liability

to perform the ID-PUIC protocol. Thus, our protocol

has the property of the general public conjointly.

C. Additive Pairing

Our protocol is created on additive pairing:

Denote G1 and G2 as a pair of cyclic increasing

groups international organization agency have a

similar prime order letter of the alphabet. Let

Z∗qdenotes the increasing cluster of the sphere Fq.

Additive pairings may be an additive map: G1 × G1

→ G2 that satisfies the properties below

1) Bilinearity: ∀g1, g2, g3 ∈ G1 and a, b ∈Z∗q, e (g1,

g2g3) = e (g2g3, g1) = e (g2, g1) e (g3, g1) e (g1a,

g2b) = e (g1, g2) ab

2) Non-degeneracy: ∃g4, g5 ∈ G1 such e (g4, g5)

6=1G2.

3) Computability: ∀g6, g7 ∈ G1, there's Associate in

Nursing economical rule to work out e (g6, g7).

The concrete additive pairings practice creates e the

modified Weil or John Orley poet pairings on Elliptic

Curves

Algorithm: algorithm to supply economical search in

cryptography formula

When the protection parameter k is input, the

algorithm outputs the public system parameters and

additionally the master secret key. The system public

parameters unit created public and additionally the

master secret key mask is formed confidential by

KGC.

A region correction algorithm.

Page 6: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,

International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.

© 2017, IJCERT All Rights Reserved Page | 397

5.Result

The consumer is already registered by mistreatment

his details and so he can login into the cloud

mistreatment username and Arcanum, and so he

uploads the file.

The proxy can login into the house page by

mistreatment username and Arcanum, and he can

check the proxy of the file.

The kgc can log in by mistreatment username and

Arcanum and generate the key and so update to the

transfer file. The file can transfer to the cloud

This graph shows however the file is rated supported

the downloads

5. Conclusions This paper proposes the novel security thought of ID-

PUIC publicly cloud. The paper formalizes ID-PUC's

system model and security model. Then, the primary

concrete ID-PUIC protocol is meant by victimization

the linear pairings technique. The concrete ID-PUIC

protocol is incontrovertibly secure and economical by

victimization the formal security proof and potency

analysis. On the opposite hand, the projected ID-

PUIC protocol also can understand personal remote

knowledge integrity checking, delegated remote

knowledge integrity checking and public remote

Page 7: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,

International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.

© 2017, IJCERT All Rights Reserved Page | 398

information integrity checking supported the first

client’s authorization.

References [1] V. Saiharitha, S. J. Saritha, “A privacy and

dynamic multi-keyword ranked search scheme over

cloud data encrypted” ,” IEICE Trans. Commun., pp.

190–200, 2016.

[2] Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee,

“Mutual verifiable provable data auditing in public

cloud storage,” J. Internet Technol., vol. 16, no. 2,

pp. 317–323, 2015.

[3] M. Mambo, K. Usuda, and E. Okamoto, “Proxy

signatures for delegating signing operation,” in Proc.

CCS, 1996, pp. 48– 57.

[4] E.-J. Yoon, Y. Choi, and C. Kim, “New ID-based

proxy signature scheme with message recovery,” in

Grid and Pervasive Computing (Lecture Notes in

Computer Science), vol. 7861. Berlin, Germany:

SpringerVerlag, 2013, pp. 945– 951.

[5] B.-C. Chen and H.-T.Yeh, “Secure proxy

signature schemes from the weil pairing,” J.

Supercomput., vol. 65, no. 2, pp. 496–506, 2013.

[6] X. Liu, J. Ma, J. Xiong, T. Zhang, and Q. Li,

“Personal health records integrity verification using

attribute based proxy signature in cloud computing,”

in Internet and Distributed Computing Systems

(Lecture Notes in Computer Science), vol. 8223.

Berlin, Germany: SpringerVerlag, 2013, pp. 238–

251.

[7] H. Guo, Z. Zhang, and J. Zhang, “Proxy re-

encryption with unforgeable re-encryption keys,” in

Cryptology and Network Security (Lecture Notes in

Computer Science), vol. 8813. Berlin, Germany:

Springer-Verlag, 2014, pp. 20–33.

[8] E. Kirshanova, “Proxy re-encryption from

lattices,” in Public-Key Cryptography (Lecture Notes

in Computer Science), vol. 8383. Berlin, Germany:

Springer-Verlag, 2014, pp. 77–94.

[9] P. Xu, H. Chen, D. Zou, and H. Jin, “Fine-grained

and heterogeneous proxy re-encryption for secure

cloud storage,” Chin. Sci. Bull., vol. 59, no. 32, pp.

4201–4209, 2014.

[10] S. Ohata, Y. Kawai, T. Matsuda, G. Hanaoka,

and K. Matsuura, “Re-encryption verifiability: How

to detect malicious activities of a proxy in proxy re-

encryption,” in Proc. CT-RSA Conf., vol. 9048.

2015, pp. 410–428.

[11] G. Ateniese et al., “Provable data possession at

untrusted stores,” in Proc. CCS, 2007, pp. 598–609.

[12] G. Ateniese, R. Di Pietro, L. V. Mancini, and G.

Tsudik, “Scalable and efficient provable data

possession,” in Proc. SecureComm, 2008, Art. ID 9.

[13] C. C. Erway, A. Küpçü, C. Papamanthou, and R.

Tamassia, “Dynamic provable data possession,” in

Proc. CCS, 2009, pp. 213–222.

[14] E. Esiner, A. Küpçü, and Ö. Özkasap, “Analysis

and optimization on FlexDPDP: A practical solution

for dynamic provable data possession,” Intelligent

Cloud Computing (Lecture Notes in Computer

Science), vol. 8993. Berlin, Germany: Springer-

Verlag, 2014, pp. 65–83.

[15] E. Zhou and Z. Li, “An improved remote data

possession checking protocol in cloud storage,” in

Algorithms and Architectures for Parallel Processing

(Lecture Notes in Computer Science), vol. 8631.

Berlin, Germany: SpringerVerlag, 2014, pp. 611–

617.

[16] H. Wang, “Proxy provable data possession in

public clouds,” IEEE Trans. Services Comput., vol.

6, no. 4, pp. 551– 559, Oct./Dec. 2013.

[17] H. Wang, “Identity-based distributed provable

data possession in multicloud storage,” IEEE Trans.

Services Comput., vol. 8, no. 2, pp. 328–340,

Mar./Apr. 2015.

[18] H. Wang, Q. Wu, B. Qin, and J. Domingo-

Ferrer, “FRR: Fair remote retrieval of outsourced

private medical records in electronic health

networks,” J. Biomed. Inform., vol. 50, pp. 226–233,

Aug. 2014.

[19] H. Wang, “Anonymous multi-receiver remote

data retrieval for pay-TV in public clouds,” IET Inf.

Secur., vol. 9, no. 2, pp. 108–118, Mar. 2015.

[20] H. Shacham and B. Waters, “Compact proofs of

retrievability,” in Proc. ASIACRYPT, vol.

5350.2008, pp. 90– 107.

[21] Q. Zheng and S. Xu, “Fair and dynamic proofs

of retrievability,” in Proc. CODASPY, 2011, pp.

237–248.

[22] D. Cash, A. Küpçü, and D. Wichs, “Dynamic

proofs of retrievability via oblivious RAM,” in Proc.

EUROCRYPT, vol. 7881. 2013, pp. 279–295.

[23] J. Zhang, W. Tang, and J. Mao, “Efficient public

verification proof of retrievability scheme in cloud,”

Cluster Comput., vol. 17, no. 4, pp. 1401–1411,

2014.

[24] J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee,

“A novel routing protocol providing good

transmission reliability in underwater sensor

networks,” J. Internet Technol., vol. 16, no. 1, pp.

171–178, 2015.

[25] T. Ma et al., “Social network and tag sources

based augmenting collaborative recommender

system,” IEICE Trans. Inf. Syst., vol. E98-D, no. 4,

pp. 902–910, 2015.

//crypto.stanford.edu/pbc/thesis.pdf

[26] P.FARZANA,

A.HARSHAVARDHAN,”Integrity Auditing for

Outsourced DynamicCloud Data with Group User

Page 8: Proxy Cryptography Based on Data Uploading and Data ...ijcert.org/ems/ijcert_papers/V4I1004.pdf · etc. Identity-based public key cryptography can eliminate the troublesome certificate

Hafsa Fatima Amreen et.al ,“ Proxy Cryptography Based on Data Uploading and Data Integrity in Cloud .”,

International Journal of Computer Engineering In Research Trends, 4(10):pp:392-399 ,October-2017.

© 2017, IJCERT All Rights Reserved Page | 399

Revocation.”International Journal of Computer

Engineering in Research Trends., vol.2, no.11, pp.

877-881, 2015.

[27] N. Meghasree,U.Veeresh and Dr.S.Prem

Kumar,”Multi Cloud Architecture to Provide

DataPrivacy and Integrity.”International Journal of

Computer Engineering in Research Trends., vol.2,

no.9, pp. 558-564, 2015.

[28] A.Shekinahpremasunaina,”Decentralized Fine-

grained Access Controlscheme for Secure Cloud

Storage data.”International Journal of Computer

Engineering in Research Trends., vol.2, no.7, pp.

421-424, 2015.

[29] P. Rizwanakhatoon andDr.C.MohammedGulzar

,”SecCloudPro:A Novel Secure CloudStorage System

for Auditing andDeduplication.”International Journal

of Computer Engineering in Research Trends., vol.3,

no.5, pp. 210-215, 2016.

[30] B.Sameena Begum,

P.RaghaVardhini,”Augmented Privacy-Preserving

AuthenticationProtocol by Trusted Third Party in

Cloud.”International Journal of Computer

Engineering in Research Trends., vol.2, no.5, pp.

378-382, 2015.