Improve Cloud Security By using Multi-Signature
Keywords:broadcast encryption,, cloud computing,, multi-signature, security, healthcare
The problem of security in cloud computing is notorious. Several see data as safe only when it is
managed in an internal network; others consider the cloud computing can provide the security necessary
to ensure the preservation and integrity of information. Security problems in cloud computing come from
two sides: the customer and the service provider, but the biggest load is always on the service provider.
The purpose of the proposed system is to protect distributed data beyond to multi user on the cloud.
Proposed system combination between Active broadcast encryption and multi -signature, so any user of
cloud can distribute data among other secretly. After the practical application of the proposed algorithm,
the results showed that it is more efficient and safer compared to the algorithms mentioned in the research
and also helped reduce storage after canceling the unused accounts.
Peter Mell, "What's Special about Cloud Security?," IT Professional , vol. 14, no. 4, pp. 6-8, July-
J. Grundy and A.S. Ibrahim M. Almorsy, "Collaboration-Based Cloud Computing Security
Management Framework," in IEEE 4th International Conference on Cloud Computing, Washington, DC,
USA, 2011, pp. 364-371.
A.Gordon, "The Hybrid Cloud Security Professional," IEEE Cloud Computing , vol. 3, no. 1, pp. 82
- 86, Jan-Feb 2016.
P.Dhamdhere and Y.Gajmal A.Markandey, "Data Access Security in Cloud Computing: A Review,"
in International Conference on Computing, Power and Communication Technologies (GUCON),
Galgotias University, Greater Noida, UP, India, 2018, pp. 633-636.
A.i Maulana and Asfiyan, "Design of Cloud-based and IPTV Digital Signage System System,"
TELKOMNIKA, vol. 16, no. 1, pp. 385-389, February 2018.
I.M.Murwantara, et al., "Towards Adaptive Sensor-cloud for Internet of Things," TELKOMNIKA,
vol. 16, no. 6, pp. 2771-2781, December 2018.
A. Bhawiyuga, et al., "Architectural design of IoT-cloud computing integration platformTELKOMNIKA, vol. 17, no. 3, pp. 1399 -1408, June 2019.
Arokia Paul Rajan R, "A review on serverless architectures - function as a service (FaaS) in cloud
computing," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 1,
pp. 530-537, February 2020.
Iqbal Ahmed, "A brief review: security issues in cloud computing and their solutions,"
TELKOMNIKA, vol. 17, no. 6, pp. 2812-2817, December 2019.
Iqbal Ahmed, "Technology organization environment framework in cloud computing,"
TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 2, pp. 716-725,
B.Ayyoub, et al., "A proposed cloud-based billers hub using secured e-payments system,"
TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 19, no. 1, pp. 339-348,
R. Ibrahim and N. A. Abu Bakar M. T. Amron, "Cloud computing acceptance among public sector
employees," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 19, no. 1, p.
~133, 2021 February.
M.Bahrami and M. Singhal, "A Dynamic Cloud Computing Platform for eHealth Systems," in IEEE
th International Conference on e-Health Networking, Applications and Services (Healthcom): Short
and Demo Papers, Boston, MA, USA, 2015, pp. 435-438.
Lo’ai A. Tawalbeh and S. Habeeb, "An Integrated Cloud Based Healthcare System," in Fifth
International Conference on Internet of Things: Systems, Management and Security (IoTSMS), Valencia,
Spain, 2015, pp. 268-273.
G. Sirisha and A.M.Reddy Ch.Reddy T, "Smart Healthcare Analysis and Therapy for Voice Disorder
using Cloud and Edge Computing," in 4th International Conference on Applied and Theoretical
Computing and Communication Technology (iCATccT), Mangalore, India, India, 2018, pp. 103-106.
D. Kumar and S.K. Khatri I. Singh, "Improving The Efficiency of E-Healthcare System Based on
Cloud," in 2019 Amity International Conference on Artificial Intelligence (AICAI), ubai, United Arab
Emirates, United Arab Emirates, 2019, pp. 930-933.
V.Casola, et al., "Healthcare Related Data in the Cloud:Challenges and Opportunities," IEEE Cloud
Computing, vol. 3, no. 6, pp. 10-14, Nov.- Dec. 2016.
H. Jemal, et al., "Cloud Computing and Mobile Devices Based System for Healthcare Application,"
in 2015 IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland, 2015, pp.
Suguna.M, et al., "A Survey on Cloud and Internet of Things Based Healthcare Diagnosis," in 4th
International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India,
India, 2018, pp. 1-4.
Pooja Natu et al, "A Comparative Analysis of Provable Data Possession Schemes in Cloud,"
(IJCSIT) International Journal of Computer Science and Information Technologies, vol. 5, no. 6, pp.
-7931, November - December 2014.
V.Kollaand P R. Rao H. Katta, "Scalable and Efficient Provable Data Possession," International
Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 9, pp. 3374-
, september 2013.
P. Liang, and Y. Mu L.Zhang, "Improving Privacy-Preserving and Security for Decentralized Key-
Policy Attributed-Based Encryption," JOURNAL OF LATEX CLASS FILES, vol. 14, no. 8, pp. 1-10,
You and L. Wang, "Hierarchical Authority Key-Policy Attribute-Based Encryption," in IEEE 16th
International Conference on Communication Technology (ICCT), Hangzhou, China, 2015, pp. 868-872.
and P.VijayaKarthik Sangeetha.M, "To provide a secured access control using combined hybrid Key-
Ciphertext Attribute based encryption (KC-ABE)," in IEEE INTERNATIONAL CONFERENCE ON
INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING,
Srivilliputhur, India, 2017, pp. 1-4.
G.B.V.PADMANADH P.L.DEVI, "Dynamic Broadcast Encryption Techniques for Groups in the
Cloud," International Journal of Scientific Engineering and Technology Research, vol. 3, no. 31, pp.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Journal of education for Pure Science (Jeds), University of Thi-Qar as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from Journal of education for Pure Science (Jeds), University of Thi-Qar.
Journal of education for Pure Science (Jeds), University of Thi-Qar, the Editors and the Advisory International Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the Journal of education for Pure Science (Jeds), University of Thi-Qar are sole and exclusive responsibility of their respective authors and advertisers.