NEW APPROACH OF TPA BASED DATA ACCESS MODEL
DOI:
https://doi.org/10.61841/420qkd26Keywords:
TPA Based Security, Cloud Storage, Data Access, Data StorageAbstract
Data access and storage are the basic needs for any organization, and they are a part of any organization's routine activity. When performing data access, the main concern is regarding the ease of access to and transfer of data with the proper security for that data. Data access distinguishes the roles and responsibilities between the abilities of administrators & that of end users while accessing the repository or the stored data. This paper presents a TPA-based security model that performs data sharing through encrypted data chunks. This model is not only effective in terms of the data transfers but also more secure than the existing models.
Downloads
References
[1] A.S. Kalyana Kumar, K. Abdul Razak, “A Secure Crypto-Based Data Outsourcing Model for Monitoring the Smart Environment in Cloud,” Int. J. Scient. Technol. Res., vol. 8, pp. 7-12, 2019.
[2] R. Singh and S. Prakash, “Privacy preserving in TPA for secure cloud by using encryption technique,” in IEEE Int. Conf. Innovat. Inf., Embedded Comm. Sys. (ICIIECS), March 2017, pp. 1-5.
[3] J S. Hiremath and S. R. Kunte, “Ensuring Cloud Data Security using Public Auditing with Privacy Preserving,” in IEEE 3rd Int. Conf. Comm. Electron. Sys. (ICCES), Oct 2018, pp. 1100-1104.
[4] P. Kharmate and R. Suryawanshi, "Cloud-Based Two-Tier Security Scheme for Store, Share, and Audit Our Data into the Cloud," in IEEE Int. Conf. Adv. Electr., Comm. Comp. Technol. (ICAECCT), Dec. 2016, pp. 116-121.
[5] Bin Feng, Xinzhu Ma,Cheng Guo,Hui Shi, and Zhangjie Fu,An Efficient Protocol With Bidirectional Verification For Storage Security in Cloud Computing," in IEEE Acc., vol. 4, pp. 7899-7911, 2016.
[6] O. Heinisuo, V. Lenarduzzi, and D. Taibi, "Asterism: Decentralized File Sharing Application for Mobile Devices," IEEE Int. Conf. Mob. Cloud Comp. Serv. Eng. (MobileCloud), 2019, pp. 38-47.
[7] M. A. Mohammed, Z. H. Salih, N. Ţăpuş, and R. A. K. Hasan, "Security and accountability for sharing the data stored in the cloud," RoEduNet Conf. Net. Educ. Res., 2016, pp. 1-5.
[8] S. Hiremath and S. Kunte, “A novel data auditing approach to achieve data privacy and data integrity in cloud computing,” in IEEE Int. Conf. Electrical, Electronics, Comm., Comp., Optimizat. Techniq. (ICEECCOT), Dec. 2017, pp. 306-310.
[9] D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman, and D. Woods, "Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds," in IEEE Trans Cloud Comp., vol. 5, issue. 3, pp. 523-536, 2017.
[10] Z. Xia, X. Wang, X. Sun, and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data," in IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, 1 Feb. 2016.
[11] S. D. Thosar and P. Sonewar, “Data integrity verification privacy preserving approach of cloud using Third Party Auditor and multithreading,” in IEEE Int. Conf. Comput. Comm. Cont. Automat. (ICCUBEA), Aug. 2016, pp. 1-4.
[12] I. El Ghoubach, R. B. Abbou and F. Mrabti, “A secure and efficient remote data auditing scheme for cloud storage,” J. King Saud Uni. Comp. Inf. Sci., 2019.
[13] S. H. Abbdal, H. Jin, A. A. Yassin, Z. A. Abduljabbar, M. A. Hussain, Z. A. Hussien, and D. Zou, “An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage,” in IEEE 2nd Int. Conf. Big Data Sec. Cloud (BigDataSecurity), IEEE Int. Conf. High Perf. Smart Comput. (HPSC), and IEEE Int. Conf. Intellig. Data Sec. (IDS), April 2016, pp. 412-417.
[14] S. Hiremath and S. R. Kunte, “Ensuring Cloud Data Security using Public Auditing with Privacy Preserving,” in IEEE 3rd Int. Conf. Comm. Electron. Sys. (ICCES), Oct. 2018, pp. 1100-1104.
[15] S. Patii and N. Rai, “An effectual information probity with two TPAS in cloud storage system,” in IEEE 3rd Int. Conf. Sci. Technol. Engineer. Manage. (ICONSTEM), March 2017, pp. 432-434.
[16] A. K. Udagatti and N. R. Sunitha, "Fault-tolerant public auditing system in cloud environments,” in IEEE 2nd Int. Conf. Appl. Theoret. Comput. Comm. Technol. (iCATccT), July 2016, pp. 359-362.
[17] J. Raja and M. Ramakrishnan, “Public key-based third-party auditing system using random masking and bilinear total signature for privacy in a public cloud environment,” in IEEE Int. Conf. Intellig. Comput. Cont. Sys. (ICICCS), June 2017, pp. 1200-1205.
[18] S. Shaikh and D. Vora, “Secure cloud auditing over encrypted data,” in IEEE Int. Conf. Comm. Electron. Sys. (ICCES), Oct. 2016, pp. 1-5.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.