2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) 2022
DOI: 10.1109/icbds53701.2022.9935980
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…We considered a data access control system in multi-authority cloud storage, as described in Fig. 3.1 There are 5 kinds of entities within the system: a security key generation and distribution module which is responsible for generating cryptographic keys and distributing them among data owners and users, data owners are responsible for outsourcing data over cloud, data users can only request for data and download data if respective owner of that data permits it, lastly the third party auditor an audit the data to check integrity of that data [19]. The module works by splitting the original file into chunks and generating a log file with the order in which those chunks should be re-assembled.…”
Section: Porposed Modellingmentioning
confidence: 99%
“…We considered a data access control system in multi-authority cloud storage, as described in Fig. 3.1 There are 5 kinds of entities within the system: a security key generation and distribution module which is responsible for generating cryptographic keys and distributing them among data owners and users, data owners are responsible for outsourcing data over cloud, data users can only request for data and download data if respective owner of that data permits it, lastly the third party auditor an audit the data to check integrity of that data [19]. The module works by splitting the original file into chunks and generating a log file with the order in which those chunks should be re-assembled.…”
Section: Porposed Modellingmentioning
confidence: 99%
“…Each of these access control models has its own advantages and disadvantages. The choice of access control model will depend on the specific security requirements of the cloud computing environment [4][5] [38] The proposed paper introduces a comprehensive framework for cost-optimized cloud storage that addresses the challenges of maintaining data security, privacy, integrity, and availability at lower cost. The proposed framework leverages a secure authenticity scheme to protect data during storage or transfer over the cloud, and a two-layer security approach that ensures only authorized users can access sensitive data.…”
Section: Rule-based Access Control (Rbac)mentioning
confidence: 99%