Abstract
In this paper, we provide a secure storage of data in the cloud server using Identity-Based Encryption. Where the data owner shares the stored data with the cloud users on the basics of pay-as-you-use principle. The cloud user request for the encrypted data, stored on the cloud server’s database (by applying encryption on keyword) and the server verifies the request by performing test on encrypted data. So, that illegal users or unauthorized servers cannot attack on the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in IEEE Symposium on Security and Privacy. S&P, Proceedings. IEEE 2000, 44–55 (2000)
E.J. Goh, Secure Indexes. IACR Cryptology ePrint Archive, 216 (2003)
Y.C. Chang, M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, Applied Cryptography and Network Security (Springer, Berlin, 2005)
P. Golle, J. Staddon, B. Waters, Secure conjunctive search over encrypted data, in ACNS 2004, Lecture Notes in Computer Science, vol. 3089 (Springer, 2004), p. 314
D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Proceedings of EUROCRYP04, LNCS, vol. 3027 (Springer, 2004)
R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM Conference on Computer and Communications Security (ACM, 2006), pp. 79–88
K. Kurosawa, Y. Ohtaki, UC-secure searchable symmetric encryption, Financial Cryptography and Data Security (Springer, Berlin, 2012)
Z. Jianhong, D. Qiaocui, Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343, 1–14 (2016)
V. Chang, W. Gary, A model to compare cloud and non-cloud storage of big data. Future Gener. Comput. Syst. 57, 56–76 (2016)
L. Yan, C. Rong, G. Zhao, Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography, in Cloud Computing (2009), pp. 167–177
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mohit, P., Biswas, G.P. (2017). Confidentiality and Storage of Data in Cloud Environment. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https://doi.org/10.1007/978-981-10-3156-4_29
Download citation
DOI: https://doi.org/10.1007/978-981-10-3156-4_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3155-7
Online ISBN: 978-981-10-3156-4
eBook Packages: EngineeringEngineering (R0)