NEW APPROACH OF TPA BASED DATA ACCESS MODEL

Authors

  • Ashish, Bhardwaj School of Computer Science & System Studies, Career Point University, Alaniya, Jhalawar Road, Kota-325003, Rajasthan, India Author
  • Surendra, Yadav School of Computer Science & System Studies, Career Point University, Alaniya, Jhalawar Road, Kota-325003, Rajasthan, India Author

DOI:

https://doi.org/10.61841/420qkd26

Keywords:

TPA Based Security, Cloud Storage, Data Access, Data Storage

Abstract

Data access and storage are the basic needs for any organization, and they are a part of any organization's routine activity. When performing data access, the main concern is regarding the ease of access to and transfer of data with the proper security for that data. Data access distinguishes the roles and responsibilities between the abilities of administrators & that of end users while accessing the repository or the stored data. This paper presents a TPA-based security model that performs data sharing through encrypted data chunks. This model is not only effective in terms of the data transfers but also more secure than the existing models. 

Downloads

Download data is not yet available.

References

[1] A.S. Kalyana Kumar, K. Abdul Razak, “A Secure Crypto-Based Data Outsourcing Model for Monitoring the Smart Environment in Cloud,” Int. J. Scient. Technol. Res., vol. 8, pp. 7-12, 2019.

[2] R. Singh and S. Prakash, “Privacy preserving in TPA for secure cloud by using encryption technique,” in IEEE Int. Conf. Innovat. Inf., Embedded Comm. Sys. (ICIIECS), March 2017, pp. 1-5.

[3] J S. Hiremath and S. R. Kunte, “Ensuring Cloud Data Security using Public Auditing with Privacy Preserving,” in IEEE 3rd Int. Conf. Comm. Electron. Sys. (ICCES), Oct 2018, pp. 1100-1104.

[4] P. Kharmate and R. Suryawanshi, "Cloud-Based Two-Tier Security Scheme for Store, Share, and Audit Our Data into the Cloud," in IEEE Int. Conf. Adv. Electr., Comm. Comp. Technol. (ICAECCT), Dec. 2016, pp. 116-121.

[5] Bin Feng, Xinzhu Ma,Cheng Guo,Hui Shi, and Zhangjie Fu,An Efficient Protocol With Bidirectional Verification For Storage Security in Cloud Computing," in IEEE Acc., vol. 4, pp. 7899-7911, 2016.

[6] O. Heinisuo, V. Lenarduzzi, and D. Taibi, "Asterism: Decentralized File Sharing Application for Mobile Devices," IEEE Int. Conf. Mob. Cloud Comp. Serv. Eng. (MobileCloud), 2019, pp. 38-47.

[7] M. A. Mohammed, Z. H. Salih, N. Ţăpuş, and R. A. K. Hasan, "Security and accountability for sharing the data stored in the cloud," RoEduNet Conf. Net. Educ. Res., 2016, pp. 1-5.

[8] S. Hiremath and S. Kunte, “A novel data auditing approach to achieve data privacy and data integrity in cloud computing,” in IEEE Int. Conf. Electrical, Electronics, Comm., Comp., Optimizat. Techniq. (ICEECCOT), Dec. 2017, pp. 306-310.

[9] D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods, "Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds," in IEEE Trans Cloud Comp., vol. 5, issue. 3, pp. 523-536, 2017.

[10] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data," in IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, 1 Feb. 2016.

[11] S. D. Thosar and P. Sonewar, “Data integrity verification privacy preserving approach of cloud using Third Party Auditor and multithreading,” in IEEE Int. Conf. Comput. Comm. Cont. Automat. (ICCUBEA), Aug. 2016, pp. 1-4.

[12] I. El Ghoubach, R. B. Abbou and F. Mrabti, “A secure and efficient remote data auditing scheme for cloud storage,” J. King Saud Uni. Comp. Inf. Sci., 2019.

[13] S. H. Abbdal, H. Jin, A. A. Yassin, Z. A. Abduljabbar, M. A. Hussain, Z. A. Hussien, and D. Zou, “An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage,” in IEEE 2nd Int. Conf. Big Data Sec. Cloud (BigDataSecurity), IEEE Int. Conf. High Perf. Smart Comput. (HPSC), and IEEE Int. Conf. Intellig. Data Sec. (IDS), April 2016, pp. 412-417.

[14] S. Hiremath and S. R. Kunte, “Ensuring Cloud Data Security using Public Auditing with Privacy Preserving,” in IEEE 3rd Int. Conf. Comm. Electron. Sys. (ICCES), Oct. 2018, pp. 1100-1104.

[15] S. Patii and N. Rai, “An effectual information probity with two TPAS in cloud storage system,” in IEEE 3rd Int. Conf. Sci. Technol. Engineer. Manage. (ICONSTEM), March 2017, pp. 432-434.

[16] A. K. Udagatti and N. R. Sunitha, "Fault-tolerant public auditing system in cloud environments,” in IEEE 2nd Int. Conf. Appl. Theoret. Comput. Comm. Technol. (iCATccT), July 2016, pp. 359-362.

[17] J. Raja and M. Ramakrishnan, “Public key-based third-party auditing system using random masking and bilinear total signature for privacy in a public cloud environment,” in IEEE Int. Conf. Intellig. Comput. Cont. Sys. (ICICCS), June 2017, pp. 1200-1205.

[18] S. Shaikh and D. Vora, “Secure cloud auditing over encrypted data,” in IEEE Int. Conf. Comm. Electron. Sys. (ICCES), Oct. 2016, pp. 1-5.

Downloads

Published

30.04.2020

How to Cite

Bhardwaj, A., & Yadav, S. (2020). NEW APPROACH OF TPA BASED DATA ACCESS MODEL. International Journal of Psychosocial Rehabilitation, 24(2), 5412-5422. https://doi.org/10.61841/420qkd26