Improve Cloud Security By using Multi-Signature
DOI:
https://doi.org/10.32792/jeps.v12i2.230Keywords:
broadcast encryption,, cloud computing,, multi-signature, security, healthcareAbstract
The problem of security in cloud computing is notorious. Several see data as safe only when it is
managed in an internal network; others consider the cloud computing can provide the security necessary
to ensure the preservation and integrity of information. Security problems in cloud computing come from
two sides: the customer and the service provider, but the biggest load is always on the service provider.
The purpose of the proposed system is to protect distributed data beyond to multi user on the cloud.
Proposed system combination between Active broadcast encryption and multi -signature, so any user of
cloud can distribute data among other secretly. After the practical application of the proposed algorithm,
the results showed that it is more efficient and safer compared to the algorithms mentioned in the research
and also helped reduce storage after canceling the unused accounts.
References
Peter Mell, "What's Special about Cloud Security?," IT Professional , vol. 14, no. 4, pp. 6-8, July-
Aug 2012.
J. Grundy and A.S. Ibrahim M. Almorsy, "Collaboration-Based Cloud Computing Security
Management Framework," in IEEE 4th International Conference on Cloud Computing, Washington, DC,
USA, 2011, pp. 364-371.
A.Gordon, "The Hybrid Cloud Security Professional," IEEE Cloud Computing , vol. 3, no. 1, pp. 82
- 86, Jan-Feb 2016.
P.Dhamdhere and Y.Gajmal A.Markandey, "Data Access Security in Cloud Computing: A Review,"
in International Conference on Computing, Power and Communication Technologies (GUCON),
Galgotias University, Greater Noida, UP, India, 2018, pp. 633-636.
A.i Maulana and Asfiyan, "Design of Cloud-based and IPTV Digital Signage System System,"
TELKOMNIKA, vol. 16, no. 1, pp. 385-389, February 2018.
I.M.Murwantara, et al., "Towards Adaptive Sensor-cloud for Internet of Things," TELKOMNIKA,
vol. 16, no. 6, pp. 2771-2781, December 2018.
A. Bhawiyuga, et al., "Architectural design of IoT-cloud computing integration platformTELKOMNIKA, vol. 17, no. 3, pp. 1399 -1408, June 2019.
Arokia Paul Rajan R, "A review on serverless architectures - function as a service (FaaS) in cloud
computing," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 1,
pp. 530-537, February 2020.
Iqbal Ahmed, "A brief review: security issues in cloud computing and their solutions,"
TELKOMNIKA, vol. 17, no. 6, pp. 2812-2817, December 2019.
Iqbal Ahmed, "Technology organization environment framework in cloud computing,"
TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 2, pp. 716-725,
April 2020.
B.Ayyoub, et al., "A proposed cloud-based billers hub using secured e-payments system,"
TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 19, no. 1, pp. 339-348,
February 2021.
R. Ibrahim and N. A. Abu Bakar M. T. Amron, "Cloud computing acceptance among public sector
employees," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 19, no. 1, p.
~133, 2021 February.
M.Bahrami and M. Singhal, "A Dynamic Cloud Computing Platform for eHealth Systems," in IEEE
th International Conference on e-Health Networking, Applications and Services (Healthcom): Short
and Demo Papers, Boston, MA, USA, 2015, pp. 435-438.
Lo’ai A. Tawalbeh and S. Habeeb, "An Integrated Cloud Based Healthcare System," in Fifth
International Conference on Internet of Things: Systems, Management and Security (IoTSMS), Valencia,
Spain, 2015, pp. 268-273.
G. Sirisha and A.M.Reddy Ch.Reddy T, "Smart Healthcare Analysis and Therapy for Voice Disorder
using Cloud and Edge Computing," in 4th International Conference on Applied and Theoretical
Computing and Communication Technology (iCATccT), Mangalore, India, India, 2018, pp. 103-106.
D. Kumar and S.K. Khatri I. Singh, "Improving The Efficiency of E-Healthcare System Based on
Cloud," in 2019 Amity International Conference on Artificial Intelligence (AICAI), ubai, United Arab
Emirates, United Arab Emirates, 2019, pp. 930-933.
V.Casola, et al., "Healthcare Related Data in the Cloud:Challenges and Opportunities," IEEE Cloud
Computing, vol. 3, no. 6, pp. 10-14, Nov.- Dec. 2016.
H. Jemal, et al., "Cloud Computing and Mobile Devices Based System for Healthcare Application,"
in 2015 IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland, 2015, pp.
-5.
Suguna.M, et al., "A Survey on Cloud and Internet of Things Based Healthcare Diagnosis," in 4th
International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India,
India, 2018, pp. 1-4.
Pooja Natu et al, "A Comparative Analysis of Provable Data Possession Schemes in Cloud,"
(IJCSIT) International Journal of Computer Science and Information Technologies, vol. 5, no. 6, pp.
-7931, November - December 2014.
V.Kollaand P R. Rao H. Katta, "Scalable and Efficient Provable Data Possession," International
Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 9, pp. 3374-
, september 2013.
P. Liang, and Y. Mu L.Zhang, "Improving Privacy-Preserving and Security for Decentralized Key-
Policy Attributed-Based Encryption," JOURNAL OF LATEX CLASS FILES, vol. 14, no. 8, pp. 1-10,
AUGUST 2015.
You and L. Wang, "Hierarchical Authority Key-Policy Attribute-Based Encryption," in IEEE 16th
International Conference on Communication Technology (ICCT), Hangzhou, China, 2015, pp. 868-872.
and P.VijayaKarthik Sangeetha.M, "To provide a secured access control using combined hybrid Key-
Ciphertext Attribute based encryption (KC-ABE)," in IEEE INTERNATIONAL CONFERENCE ON
INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING,
Srivilliputhur, India, 2017, pp. 1-4.
G.B.V.PADMANADH P.L.DEVI, "Dynamic Broadcast Encryption Techniques for Groups in the
Cloud," International Journal of Scientific Engineering and Technology Research, vol. 3, no. 31, pp.
-6262, October,2014.
Downloads
Published
Issue
Section
License
Copyright Policy
Authors retain copyright of their articles published in the Journal of Education for Pure Science (JEPS).
By submitting their work, authors grant the journal a non-exclusive license to publish, distribute, and archive the article in all formats and media.
License
All articles published in JEPS are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided that the original author(s) and the source are properly credited.
Author Rights
Authors have the right to:
-
Share their articles on personal websites, institutional repositories, and academic platforms
-
Reuse their work in future research and publications
-
Distribute the published version without restriction
Journal Rights
The journal retains the right to:
-
Publish and archive the articles
-
Include them in indexing and archiving systems such as LOCKSS and CLOCKSS
-
Promote and disseminate the published work
Responsibility
The contents of all articles are the sole responsibility of the authors. The journal, editors, and editorial board are not responsible for any errors, opinions, or statements expressed in the published articles.
Open Access Statement
JEPS provides immediate open access to its content, supporting the principle that making research freely available to the public enhances global knowledge exchange.
This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0/