Cloud Merged
Cloud Merged
Cloud Merged
PHASE I REPORT
Submitted
by
AMUTHA.C
(620822405003)
degree of
MASTER OF ENGINEERING
IN
GNANAMANI COLLEGE OF
TECHNOLOGY NAMAKKAL–
637018
DECEMBER 2023
i
ANNA UNIVERSITY: CHENNAI 600025
DECEMBER 2023
ii
PROXY RE-ENCRYPTION METHOD FOR
SECURE DATA SHARING IN BLOCKCHAIN
USING INTERNET OF THINGS
PHASE I REPORT
Submitted
by
AMUTHA.C
(620822405003)
degree of
MASTER OF ENGINEERING
IN
GNANAMANI COLLEGE OF
TECHNOLOGY NAMAKKAL–
637018
BONAFIDE CETIFICATE
SIGNATURE SIGNATURE
iii
GNANAMANI COLLEGE OF TECHNOLOGY,
NAMAKKAL -637 018
INSTITUT E
VISION
Emerging as a technical institution of high standard and excellence to produce quality Engineers,
Researchers, Administrators and Entrepreneurs with ethical and moral values to contribute the
sustainable development of the society.
MISSION
analytical and practical skills in cutting edge technologies by imparting quality technical education.
sonalities to transfer technology to industries and rural areas by creating interests among students in Research
DEPARTMENT
VISION
To evolve as a Centre of Excellence to produce the most competent software professionals, researchers, e
MISSION
Imparting quality education through latest technologies to prepare Students as software developer an
Inculcating the technological transformations for the sustainable development of society.
iv
ABSTRACT (ENGLISH)
The evolution of the Internet of Things has seen data sharing as one of its most
useful applications in cloud computing. As eye-catching as this technology has been,
data security remains one of the obstacles it faces since the wrongful use of data leads
to several damages. In this article, we propose a proxy re-encryption approach to
secure data sharing in cloud environments. Data owners can outsource their encrypted
data to the cloud using identity-based encryption, while proxy re-encryption
construction will grant legitimate users access to the data. It uses proxy authorization
and verification to upload medical data over cloud-based M-CPS. the best method is
Advanced Encryption Standard method (AES). There are many types of AES that can
be used but the most effective is AES-128. So, the aim of this study is to design image
cryptographic application using the AES-128 method. Process of design applications
with this method is through several stages, such as process of encryption, decryption,
key generation and testing of the methods used. The attacks test is given by cropping,
blurring, and enhancing the ciphertext image. To reduce the storage problem in Cloud
we have split the image and file into different block and get stored, so storage problem
get rectified. The proposed scheme needs to reduce the computation cost on the end-
user as much as possible.
v
ABSTRACT (TAMIL)
vi
ACKNOWLEDGEMENT
AMUTHA.C
vii
TABLE OF CONTENTS
1 INTRODUCTION 1
1.1 INTRODUCTION 1
2 LITERATURE SURVEY 2
3 SYSTEM STUDY 5
3.1 Existing System 5
3.1.1 Limitation Of Existing System 6
3.2 Proposed System 6
3.2.1 Advantages Of Proposed System 7
3.3 AES-based encryption algorithms 8
4 SYSTEM MODULES 9
4.1 Modules 9
4.1.1 Data Owner 9
4.1.2 Private Key Generator 10
4.1.3 Proxy Server 10
4.1.4 Trusted Auditor 10
4.1.5 Advanced Encryption Standard 11
4.1.6 Block Storage 12
4.2 System Specifications 12
4.2.1 Software Requirements 12
4.2.2 Hardware Requirements 12
vii
i
5 SYSTEM DESIGN AND DEVELOPMENT 13
5.1 Data Flow Diagram 13
5.2 UML Diagrams 15
5.3 Use Case Diagram 16
5.4 Class Diagram 17
5.5 Sequence Diagram 18
5.6 Activity Diagram 19
5.7 Input And Output Design 20
5.7.1 Input Design 20
5.7.2 Output Design 21
5.8 Software Environment 22
5.8.1 Java Technology 22
5.8.2 Software Model 25
5.8.3 Validation And Verification Model –V-Model 26
5.8.4 Cloud Computing 28
6 CONCLUSION 32
REFERENCE 33
ix
LIST OF FIGURES
FIGURE TITLE PAGE NO
NO
3.1 Proposed System 8
5.1 Data Flow Diagram 14
5.2 Use Case Diagram 16
5.3 Class Diagram 17
5.4 Sequence Diagram 18
5.5 Activity Diagram 19
x
CHAPTER 1
INTRODUCTION
1.1 INTRODUCTION
However, once DO deletes the local copies of the files after uploading the
files to CS, he/she will not control the files. In this case, it's difficult for DO to
confirm the integrity of outsourced data by using traditional data integrity checking
schemes. In addition, due to the particularity of the cloud environment, CS is not
only subject to malicious attacks from external adversaries, but also suffers from
internal software errors or hardware failures. In these cases, DO's files are
vulnerable to tampering, corruption, and loss. Besides, CS is an semi-trusted entity
which may deliberately delete files that DO never or rarely accesses and conceals
data errors caused by unexpected events. In summary, although cloud computing
technology brings a lot of convenience, it also raises many security issues [3], [4].
Hence, many experts and scholars have made plenty of efforts to tackle these
security problems.
1
CHAPTER 2
LITERATURE
SURVEY
2
numerous security and privacy issues have been addressed including policy
management,
3
authentication, access control, and confidentiality. The technologies such as big-
data, Internet of Things, and cloud have improved the development of modern
healthcare systems to improve the quality of medical services. It is nowadays
integrating the computing methods and communication technologies such as
wireless sensor networks, radio frequency identification, smartphones, and location
awareness to collect and analyze the physiological data of the patient. The e-Health
entities such as medical device, client, and server rely on analytical models to carry
out early diagnosis and remote monitoring.
A Secure and Anonymous Biometric Based User Authentication Scheme
(SAB-UAS) is proposed to ensure secure communication in healthcare
applications[3]. This paper also proves that an adversary cannot impersonate as a
legitimate user to illegally access or revoke the smart handheld card. A formal
analysis based on the random-oracle model and resource analysis is provided to
show security and resource efficiencies in medical application systems. In addition,
the proposed scheme takes a part of the performance analysis to show that it has
high-security features to build smart healthcare application systems in the IoM. To
this end, experimental analysis has been conducted for the analysis of network
parameters using NS3 simulator.
4
Afterward, the CPS systems and platforms have been established, where
more focus was directed toward CPS-based healthcare. The big data
framework of CPSs is also included. Data collaboration in cloud computing is
more and more popular nowadays, and proxy deployment schemes are employed to
realize cross- cloud data collaboration[5]. However, data security and privacy are
the most serious issues that would raise great concerns from users when they adopt
cloud systems to handle data collaboration. Different cryptographic techniques are
deployed in different cloud service providers, which makes cross-cloud data
collaboration to be a deeper challenge.
In this paper, we propose an adaptive secure cross-cloud data collaboration
scheme with identity-based cryptography (IBC) and proxy re-encryption (PRE)
techniques. We first present a secure cross-cloud data collaboration framework,
which protects data confidentiality with IBC technique and transfers the
collaborated data in an encrypted form by deploying a proxy close to the clouds.
We then provide an adaptive conditional PRE protocol with the designed full
identity-based broadcast conditional PRE algorithm, which can achieve flexible
and conditional data re- encryption among ciphertexts encrypted in identity-based
encryption manner and ciphertexts encrypted in identity-based broadcast
encryption manner. The extensive analysis and experimental evaluations
demonstrate the well security and performance of our scheme, which meets the
secure data collaboration requirements in cross-cloud scenarios.
5
CHAPTER 3
SYSTEM STUDY
In data sharing, any information must be encrypted from the source and only
decrypted by authorized users in order to preserve its protection. Conventional
encryption techniques can be used, where the decryption key is shared among all
the data users designated by the data owner. The use of symmetric encryption
implies that the same key is shared between the data owner and users, or at least
the participants agree on a key. This solution is very inefficient. Furthermore, the
data owners do not know in advance who the intended data users are, and,
therefore, the encrypted data needs to be decrypted and subsequently encrypted
with a key known to both the data owner and the users. This decrypt-and-encrypt
solution means the data owner has to be online all the time, which is practically not
feasible.
The problem becomes increasingly complex when there are multiple pieces
of data and diverse data owners and users A proxy runs the re-encryption algorithm
with the key and revamps the ciphertext before sending the new ciphertext to the
user. An intrinsic trait of a PRE scheme is that the proxy is not fully trusted (it has
no idea of the data owner’s secret key). This is seen as a prime candidate for
delegating access to encrypted data in a secured manner, which is a crucial
component in any data-sharing scenario. In addition, PRE allows for encrypted
data in the cloud to be shared to authorized users while maintaining its
confidentiality from illegitimate parties.
6
3.1.1 LIMITATION OF EXISTING SYSTEM
The problem becomes increasingly complex when there are multiple pieces
of data and diverse data owners and users.
Existing schemes adopt the conventional ciphertext policy proxy re
encryption to encrypt which inevitably expose the access policy to the cloud.
The data attributes while preserving the statistical data of the role attributes
is a challenging problem.
Attract can they have chance to attack the file form cloud
The existing techniques have limitations and are not applicable to the
healthcare industry’s medical imaging problem.
Image overloaded problem because all images are stored in same location
7
There are many types of AES that can be used but the most effective is AES-
128. So, the aim of this study is to design image cryptographic application using
the AES-128 method. it was found that this method is resistant to cropping attacks,
but not resistant to blurring and enhancement attacks. Improve the efficiency if
image storage function.
Our proposed scheme, and show that the security and privacy goals have
been achieved. We first prove that the three-layer encryption scheme is
secure.
We provide rigorous security analyses and conduct extensive experiments to
confirm the efficacy and efficiency of our proposed scheme blowfish
enryption.
Uses attributes of the users to provide access to data. Time enabled method
specifies time for every attribute of a user which is termed as access time of
the attribute.
Using this algorithm, many data points are eliminated in constant time rather
than linear time. When the elements are high-dimensional data, the
computational cost reduction will be significant.
Advanced Encryption Standard (AES) is a cryptographic algorithm that can
be used rightly to secure data.
AES (Advanced Encryption Standard) is the development of the standard
DES (Data Encryption Standard) encryption algorithm of which validity
period deemed to be over due to security.
8
Fig 3.1 Proposed system
9
CHAPTER 4
SYSTEM MODULES
4.1 MODULES
Data Owner
Proxy Server
Trusy Authorizer
AES
Block storage
10
4.1.2 Private Key Generator
It generates a public–private key pair between the data owner and proxy
authorizer to offer a reliable connection and key distribution. Data owner IDDO is
capable to generate the signature warrant sw that designates the signature as a
delegate to the proxy PID. Finally, PID generates the signed private-key Spk based
on sw. Considering a medical file MF with an index tag IT , public parameters,
signed private-key Spk, and symmetric-key τ , PID generates the output
parameters, such as signature set κ and encrypted medical file MF . Finally, PID
uploads the system parameters {MF , κ, IT }, and signature warrant sw to cloud
M-CPS.
It may gain the authorized access to process and upload the medical data in
cloud-based M-CPS that maintains better authorization and data management.
Upon verification, the proxy authorizer deletes the accessed data from the local
storage. In practice, this system is lacking the outsource controller to validate
whether the medical authority is honest or not to process the data uploading.
Alongside the common drawbacks of CPS are timing and concurrency control. In
other words, cloud-based data storage provides basic medical diagnoses to
highlight the integrity of clinical data; however, slight modification may lead to
severe medical threats such as death. Therefore, users including patients and
doctors should authorize a medical authority to process and upload the medical
data to cloud-data storage.
It can validate the integrity of medical data stored in cloud server upon the
request of the data ownerAt first, a trusted auditor validates the authorization
11
access that considers the challenge message to audit the information to return the
response
12
as true. Otherwise, it returns the message as false. trusted auditors and medical
cloud-server have a powerful computation capability to reduce the device
workload. Hence, it does not incur any excessive computation in the process of a
cloud storage system referring to the computation and communication cost of the
computing devices. Since the proposed ID-PAOPA is based on pairing-free, it can
easily reduce the computing resource. The third quality metric is batch auditing
which can concurrently process the cost presents the efficiency rate of batch
auditing over the number of audit tasks multiple auditing tasks of the trusted
auditors. It can analyze the batch auditing to verify the process of different
computing tasks. Moreover, it can greatly save the consumption time of auditing
tasks to improve system efficiency The comparison of timing
13
4.1.6 Block storage
` Block storage chops data into blocks get it and stores them as separate pieces.
Each block of data is given a unique identifier, which allows a storage system to
place the smaller pieces of data wherever is most convenient. Block storage is
often configured to decouple the data from the user’s environment and spread it
across multiple environments that can better serve the data. And then, when data is
requested, the underlying storage software reassembles the blocks of data from
these environments and presents them back to the user.
14
CHAPTER 5
SYSTEM DESIGN AND DEVELOPMENT
15
Data Owner Register Log File upload
in
Image and
text file
File view
16
5.2 UML Diagrams
UML stands for Unified Modeling Language. UML is a standardized
general- purpose modeling language in the field of object-oriented software
engineering. The standard is managed, and was created by, the Object Management
Group. The goal is for UML to become a common language for creating models of
object oriented computer software. In its current form UML is comprised of two
major components: a Meta-model and a notation. In the future, some form of
method or process may also be added to; or associated with, UML.
GOALS:
18
Fig 5.2 Use case Diagram
19
5.4 Class Diagram
In software engineering, a class diagram in the Unified Modeling Language
(UML) is a type of static structure diagram that describes the structure of a system
by showing the system's classes, their attributes, operations (or methods), and the
relationships among the classes. It explains which class contains information.
User
Owner Registraion
Registraion
Login Login Approval () Search ()
Patient details () View users()
Upload ()
File and images()
Key check down ()
Encrypt ()
20
5.5 Sequence Diagram
A sequence diagram in Unified Modeling Language (UML) is a kind of
interaction diagram that shows how processes operate with one another and in
what order. It is a construct of a Message Sequence Chart. Sequence diagrams are
sometimes called event diagrams, event scenarios, and timing diagrams
Login
Key send
File Upload
File enrypt
File Request
File search
Decrypt
View files
21
5.6 Activity Diagram
Activity diagrams are graphical representations of workflows of stepwise
activities and actions with support for choice, iteration and concurrency. In the
Unified Modeling Language, activity diagrams can be used to describe the
business and operational step-by-step workflows of components in a system. An
activity diagram shows the overall flow of control.
Start Logout
Login No
Yes
End
22
5.7 INPUT AND OUTPUT DESIGN
5.7.1 INPUT DESIGN
The input design is the link between the information system and the user. It
comprises the developing specification and procedures for data preparation and
those steps are necessary to put transaction data in to a usable form for processing
can be achieved by inspecting the computer to read data from a written or printed
document or it can occur by having people keying the data directly into the system.
The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process
simple. The input is designed in such a way so that it provides security and ease of
use with retaining the privacy.
OBJECTIVES
1. Input Design is the process of converting a user-oriented description of the input
into a computer-based system. This design is important to avoid errors in the data
input process and show the correct direction to the management for getting correct
information from the computerized system.
2. It is achieved by creating user-friendly screens for the data entry to handle large
volume of data. The goal of designing input is to make data entry easier and to be
free from errors. The data entry screen is designed in such a way that all the data
23
manipulates can be performed. It also provides record viewing facilities.
3. When the data is entered it will check for its validity.
Data can be entered with the help of screens. Appropriate messages are
provided as when needed so that the user will not be in maize of instant. Thus the
objective of input design is to create an input layout that is easy to follow
24
Trigger an action.
Confirm an action.
Simple
Architecture neutral
Object oriented
Portable
Distributed
High performance
Interpreted
Multithreaded
Robust
Dynamic
Secure
You can think of Java byte codes as the machine code instructions for the
Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a
development tool or a Web browser that can run applets, is an implementation of
the Java VM. Java byte codes help make “write once, run anywhere” possible. You
can compile your program into byte codes on any platform that has a Java
compiler. The byte codes can then be run on any implementation of the Java VM.
That means that as long as a computer has a Java VM, the same program written in
the Java programming language can run on Windows 2000, a Solaris workstation,
or on an iMac.
26
The Java Platform
A platform is the hardware or software environment in which a program
runs. We’ve already mentioned some of the most popular platforms like Windows
2000, Linux, Solaris, and MacOS. Most platforms can be described as a
combination of the operating system and hardware.
The Java platform differs from most other platforms in that it’s a software-
only platform that runs on top of other hardware-based platforms.
The Java platform has two components:
The Java Virtual Machine (Java VM)
The Java Application Programming Interface (Java API)
You’ve already been introduced to the Java VM. It’s the base for the Java
platform and is ported onto various hardware-based platforms.
The Java API is a large collection of ready-made software components that
provide many useful capabilities, such as graphical user interface (GUI) widgets.
The Java API is grouped into libraries of related classes and interfaces; these
libraries are known as packages. The next section, What Can Java Technology Do?
Highlights what functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform.
As the figure shows, the Java API and the virtual machine insulate the program
from the hardware.
Native code is code that after you compile it, the compiled code runs on a
specific hardware platform. As a platform-independent environment, the Java
platform can be a bit slower than native code.
27
However, smart compilers, well-tuned interpreters, and just-in-time byte
code compilers can bring performance close to that of native code without
threatening portability.
28
1. Projects initiated from a request for proposal (RFP), the customer has a very
clear documented requirements
3. Embedded systems.
We can notice some similarities of these types of projects that they cannot be
delivered in iterative, incremental, or agile manner, for example, in embedded
systems for the elevator, you cannot deliver an elevator who can go up only
without going down, or handling only users requests from inside and ignore
outside calls for the elevator.
29
The technical aspect of the project cycle is considered as a V shape starting
with the business needs on the upper left and ending with the user acceptance
testing on the upper right.
System Testing
System testing is associated with the system requirements and design phase.
It combines the software, hardware, and the integration of this system with the
other external systems.
30
User Acceptance Testing
User Acceptance testing is associated with the business and operations
analysis phase. The customer users are the main performers of this testing based on
test cases and scenarios that cover the business requirements to ensure that they
have delivered the right software as per the specifications.
Cloud computing means that instead of all the computer hardware and
software you're using sitting on your desktop, or somewhere inside your company's
network, it's provided for you as a service by another company and accessed over
the Internet, usually in a completely seamless way. Exactly where the hardware
and software is located and how it all works doesn't matter to you, the user—it's
just somewhere up in the nebulous "cloud" that the Internet represents.
DATA SECURITY
Data security has consistently been a major issue in information technology.
In the cloud computing environment, it becomes particularly serious because the
data is located in different places even in all the globe. Data security and privacy
protection are the two main factors of user's concerns about the cloud technology.
Though many techniques on the topics in cloud computing have been investigated
in both academics and industries, data security and privacy protection are
becoming more important for the future development of cloud computing
technology in government, industry, and business. Data security and privacy
protection issues are relevant to both hardware and software in the cloud
architecture.
Cloud computing has been envisioned as the next generation paradigm in
31
computation. In the cloud computing environment, both applications and resources
32
are delivered on demand over the Internet as services. Cloud is an environment of
the hardware and software resources in the data centers that provide diverse
services over the network or the Internet to satisfy user's requirements
Cloud computing can be considered as a new computing archetype that can
provide services on demand at a minimal cost. The three well-known and
commonly used service models in the cloud paradigm are software as a service
(SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). In SaaS,
software with the related data is deployed by a cloud service provider, and users
can use it through the web browsers. In PaaS, a service provider facilitates services
to the users with a set of software programs that can solve the specific tasks. In
IaaS, the cloud service provider facilitates services to the users with virtual
machines and storage to improve their business capabilities.
CLOUD SERVICES
Cloud computing will enable services to be consumed easily on demand.
Cloud computing has the characteristics such as on-demand self-service,
ubiquitous network access, location independent resource pooling, rapid resource
elasticity, usage-based pricing, and transference of risk. These merits of cloud
computing have attracted substantial interests from both the industrial world and
the academic research world. Cloud computing technology is currently changing
the way to do business in the world.Data security has consistently been a major
issue in IT.
Data security becomes particularly serious in the cloud computing
environment, because data are scattered in different machines and storage devices
including servers, PCs, and various mobile devices such as wireless sensor
networks and smart phones. Data security in the cloud computing is more
complicated than data security in the traditional information systems.
33
To make the cloud computing be adopted by users and enterprise, the
security concerns of users should be rectified first to make cloud environment
trustworthy. The trustworthy environment is the basic prerequisite to win
confidence of users to adopt such a technology. Latif et al. discussed the
assessment of cloud computing risks
Data Confidentiality
Because the users do not trust the cloud providers and cloud storage service
providers are virtually impossible to eliminate potential insider threat, it is very
dangerous for users to store their sensitive data in cloud storage directly. Simple
encryption is faced with the key management problem and cannot support complex
requirements such as query, parallel modification, and fine-grained authorization.
Hybrid Technique
34
Data Availability
Data availability means the following: when accidents such as hard disk
damage, IDC fire, and network failures occur, the extent that user's data can be
used or recovered and how the users verify their data by techniques rather than
depending on the credit guarantee by the cloud service provider alone.
Data Privacy
(i) When: a subject may be more concerned about the current or future
information being revealed than information from the past.
(ii) How: a user may be comfortable if his/her friends can manually request
his/her information, but the user may not like alerts to be sent
automatically and frequently.
(iii) Extent: a user may rather have his/her information reported as an
ambiguous region rather than a precise point.
35
CHAPTER 6
CONCLUSION
In this project propose to define a specialized access policy for each data
attribute in the Company, generate a secret share for every distinct role attribute,
and reconstruct the secret to encrypt each data attribute. To preserve the access
pattern of the data attributes in the, we construct a blind data retrieving protocol
based on the Paillier encryption. provides the encryption module for the re-
encryption and also time privileges for accessing particular file. we present a
blockchain-based system model that allows for flexible authorization on encrypted
data.When the pixel value of the encrypted image is changed, the decryption
process have been successful, but it cannot restore the plaintext imagewe presented
a secure and efficient scheme to locate the exact nearest neighbor over encrypted
medical images stored.To over come storage problem we split storage space into
different way we have created multiple folders. The Advanced Encryption
Standard (AES) algorithm was successfully applied to encrypt an image. In the
decryption process, this method can restore plaintext as clear as before. Attack test
is given on the ciphertext by cropping, blurring, and enhancing. It is found that this
method can recognize plaintext clearly for cropping attacks. The performance of
our scheme is evaluated using real-world medical images.
36
REFERENCES
[1] P. K. R. Maddikunta et al., “Industry 5.0: A survey on enabling technologies
and potential applications,” J. Ind. Inf. Integr., 2021, Art. no. 100257, doi:
10.1016/j.jii.2021.100257.
[2] R. Vinuesa et al., “The role of artificial intelligence in achieving the sustainable
development goals,” Nature Commun., vol. 11, no. 1, pp. 1–10, 2020.
[3] S. Š. Žižek, Z. Nedelko, M. Mulej, and Ž. V. Ciˇ ˇ c, “Key performance
indicators and industry 4.0 – A socially responsible perspective,” Naše
Gospodarstvo/Our Economy, vol. 66, no. 3, pp. 22–35, 2020.
[4] D. B. Deebak and F. Al-Turjman, “Lightweight privacy-aware secure
authentication scheme for cyber-physical systems in the edge intelligence era,” in
Concurrency Comput., Pract. Experience, 2021, Art. no. e6510, doi:
10.1002/cpe.6510.
[5] B. D. Deebak, F. Al-Turjman, M. Aloqaily, and O. Alfandi, “An
authenticbased privacy preservation protocol for smart e-healthcare systems in
IoT,” IEEE Access, vol. 7, pp. 135632–135649, 2019.
[6] N. Dey, A. S. Ashour, F. Shi, S. J. Fong, and J. M. R. Tavares, “Medical cyber-
physical systems: A survey,” J. Med. Syst., vol. 42, no. 4, pp. 1–13, 2018.
[7] S. Chen, M. Ma, and Z. Luo, “An authentication scheme with identitybased
cryptography for M2M security in cyber-physical systems,” Secur. Commun.
Netw., vol. 9, no. 10, pp. 1146–1157, 2016.
[8] Q. Huang, Y. He, W. Yue, and Y. Yang, “Adaptive secure crosscloud data
collaboration with identity-based cryptography and conditional proxy re-
encryption,” Secur. Commun. Netw., vol. 2018, 2018, Art. no. 8932325.
[9] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving
public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp.
362– 375, Feb. 2013.
37
[10] Z. Xu, D. He, H.Wang, P. Vijayakumar, and K. K. R. Choo, “A novel
proxyoriented public auditing scheme for cloud-based medical cyber physical
systems,” J. Inf. Secur. Appl., vol. 51, 2020, Art. no. 102453.
[11] Y. Zhang, C. Xu, H. Li, K. Yang, J. Zhou, and X. Lin, “HealthDep: An
efficient and secure deduplication scheme for cloud-assisted eHealth systems,”
IEEE Trans. Ind. Informat., vol. 14, no. 9, pp. 4101–4112, Sep. 2018. [12] Z. Xu,
L. Wu, M. K. Khan, K.-K. R. Choo, and D. He, “A secure and efficient public
auditing scheme using rsa algorithm for cloud storage,” J. Supercomput., vol. 73,
no. 12, pp. 5285– 309, 2017.
[13] X. Zhang, J. Zhao, C. Xu, H. Wang, and Y. Zhang, “DOPIV: Postquantum
secure Identity-based data outsourcing with public integrity verification in cloud
storage,” IEEE Trans. Serv. Comput., to be published, doi:
10.1109/TSC.2019.2942297.
[14] P. Shabisha, A. Braeken, A. Touhafi, and K. Steenhaut, “Elliptic curve Qu-
VanStone based signcryption schemes with proxy re-encryption for secure cloud
data storage,” in Proc. Int. Conf. Cloud Comput. Technol. Appl., 2017, pp. 1–18.
[15] Q. Chen, Z. Huang, Y. Ding, Y. Zhou, and H. Huang, “A new provably secure
identity-based multi-proxy signature scheme,” in Proc. Int. Symp. Cybersp. Saf.
Secur., 2019, pp. 230–242
38