DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage


Users of cloud services are granted the ability to employ a third party auditor (also known as a TPA) through the use of public verification. Recent breakthroughs in quantum computing research, on the other hand, suggest that the application of quantum computers in cloud environments could become a reality. The vast majority of the currently available public verification schemes are founded on conventional hardness assumptions, making them susceptible to attacks from adversaries armed with quantum computers in the not too distant future. In addition, new security problems arise whenever the original data owner's access to the remote cloud server is limited or prevented altogether. These problems need to be resolved. In this paper, we propose an effective identity-based data outsourcing scheme (DOPIV) in cloud storage that includes public integrity verification. Lattice-based cryptography, which is what DOPIV is built on, is what allows it to achieve post-quantum security. With DOPIV, an original data owner is able to delegate a proxy with the responsibility of generating data signatures and then outsource those tasks to a cloud server. Without retrieving the entire data set, any TPA is able to carry out data integrity verification in a time- and resource-efficient manner on behalf of the original data owner. In addition, DOPIV has the benefits of being identity-based systems, which eliminate the need for laborious certificate management processes. We present security proofs of DOPIV in the random oracle model and carry out a comprehensive performance evaluation to demonstrate that DOPIV is more practically applicable in post-quantum secure cloud storage systems. This was accomplished by demonstrating DOPIV's ability to withstand attacks based on the random oracle model.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : ESVSSE Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption ABSTRACT: It is believed that symmetric searchable encryption, also known as SSE, will solve the problem of privacy in data outsourcing
PROJECT TITLE : Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing ABSTRACT: In a wide variety of cloud computing applications, attribute based encryption, also known as ABE, makes it
PROJECT TITLE : Semantics of Data Mining Services in Cloud Computing ABSTRACT: Users now have access to extremely comprehensive data analysis tools that include all of the benefits that come along with working in an environment
PROJECT TITLE : Secure Cloud Data Deduplication with Efficient Re-encryption ABSTRACT: The data deduplication technique has seen widespread adoption among commercial cloud storage providers, which is both important and necessary
PROJECT TITLE : Scheduling Real-Time Parallel Applications in Cloud to Minimize Energy Consumption ABSTRACT: The concept of cloud computing has emerged as an important paradigm in recent years. Cloud computing enables users to

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry