Improve Cloud Security By using Multi-Signature

المؤلفون

  • Rana H. Hussain1
  • Rasha B. Yousif2
  • Abrar K. Sabah3

DOI:

https://doi.org/10.32792/jeps.v12i2.230

الكلمات المفتاحية:

broadcast encryption,، cloud computing,، multi-signature، security، healthcare

الملخص

The problem of security in cloud computing is notorious. Several see data as safe only when it is
managed in an internal network; others consider the cloud computing can provide the security necessary
to ensure the preservation and integrity of information. Security problems in cloud computing come from
two sides: the customer and the service provider, but the biggest load is always on the service provider.
The purpose of the proposed system is to protect distributed data beyond to multi user on the cloud.
Proposed system combination between Active broadcast encryption and multi -signature, so any user of
cloud can distribute data among other secretly. After the practical application of the proposed algorithm,
the results showed that it is more efficient and safer compared to the algorithms mentioned in the research
and also helped reduce storage after canceling the unused accounts.

المراجع

Peter Mell, "What's Special about Cloud Security?," IT Professional , vol. 14, no. 4, pp. 6-8, July-

Aug 2012.

J. Grundy and A.S. Ibrahim M. Almorsy, "Collaboration-Based Cloud Computing Security

Management Framework," in IEEE 4th International Conference on Cloud Computing, Washington, DC,

USA, 2011, pp. 364-371.

A.Gordon, "The Hybrid Cloud Security Professional," IEEE Cloud Computing , vol. 3, no. 1, pp. 82

- 86, Jan-Feb 2016.

P.Dhamdhere and Y.Gajmal A.Markandey, "Data Access Security in Cloud Computing: A Review,"

in International Conference on Computing, Power and Communication Technologies (GUCON),

Galgotias University, Greater Noida, UP, India, 2018, pp. 633-636.

A.i Maulana and Asfiyan, "Design of Cloud-based and IPTV Digital Signage System System,"

TELKOMNIKA, vol. 16, no. 1, pp. 385-389, February 2018.

I.M.Murwantara, et al., "Towards Adaptive Sensor-cloud for Internet of Things," TELKOMNIKA,

vol. 16, no. 6, pp. 2771-2781, December 2018.

A. Bhawiyuga, et al., "Architectural design of IoT-cloud computing integration platformTELKOMNIKA, vol. 17, no. 3, pp. 1399 -1408, June 2019.

Arokia Paul Rajan R, "A review on serverless architectures - function as a service (FaaS) in cloud

computing," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 1,

pp. 530-537, February 2020.

Iqbal Ahmed, "A brief review: security issues in cloud computing and their solutions,"

TELKOMNIKA, vol. 17, no. 6, pp. 2812-2817, December 2019.

Iqbal Ahmed, "Technology organization environment framework in cloud computing,"

TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no. 2, pp. 716-725,

April 2020.

B.Ayyoub, et al., "A proposed cloud-based billers hub using secured e-payments system,"

TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 19, no. 1, pp. 339-348,

February 2021.

R. Ibrahim and N. A. Abu Bakar M. T. Amron, "Cloud computing acceptance among public sector

employees," TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 19, no. 1, p.

~133, 2021 February.

M.Bahrami and M. Singhal, "A Dynamic Cloud Computing Platform for eHealth Systems," in IEEE

th International Conference on e-Health Networking, Applications and Services (Healthcom): Short

and Demo Papers, Boston, MA, USA, 2015, pp. 435-438.

Lo’ai A. Tawalbeh and S. Habeeb, "An Integrated Cloud Based Healthcare System," in Fifth

International Conference on Internet of Things: Systems, Management and Security (IoTSMS), Valencia,

Spain, 2015, pp. 268-273.

G. Sirisha and A.M.Reddy Ch.Reddy T, "Smart Healthcare Analysis and Therapy for Voice Disorder

using Cloud and Edge Computing," in 4th International Conference on Applied and Theoretical

Computing and Communication Technology (iCATccT), Mangalore, India, India, 2018, pp. 103-106.

D. Kumar and S.K. Khatri I. Singh, "Improving The Efficiency of E-Healthcare System Based on

Cloud," in 2019 Amity International Conference on Artificial Intelligence (AICAI), ubai, United Arab

Emirates, United Arab Emirates, 2019, pp. 930-933.

V.Casola, et al., "Healthcare Related Data in the Cloud:Challenges and Opportunities," IEEE Cloud

Computing, vol. 3, no. 6, pp. 10-14, Nov.- Dec. 2016.

H. Jemal, et al., "Cloud Computing and Mobile Devices Based System for Healthcare Application,"

in 2015 IEEE International Symposium on Technology and Society (ISTAS), Dublin, Ireland, 2015, pp.

-5.

Suguna.M, et al., "A Survey on Cloud and Internet of Things Based Healthcare Diagnosis," in 4th

International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India,

India, 2018, pp. 1-4.

Pooja Natu et al, "A Comparative Analysis of Provable Data Possession Schemes in Cloud,"

(IJCSIT) International Journal of Computer Science and Information Technologies, vol. 5, no. 6, pp.

-7931, November - December 2014.

V.Kollaand P R. Rao H. Katta, "Scalable and Efficient Provable Data Possession," International

Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 9, pp. 3374-

, september 2013.

P. Liang, and Y. Mu L.Zhang, "Improving Privacy-Preserving and Security for Decentralized Key-

Policy Attributed-Based Encryption," JOURNAL OF LATEX CLASS FILES, vol. 14, no. 8, pp. 1-10,

AUGUST 2015.

You and L. Wang, "Hierarchical Authority Key-Policy Attribute-Based Encryption," in IEEE 16th

International Conference on Communication Technology (ICCT), Hangzhou, China, 2015, pp. 868-872.

and P.VijayaKarthik Sangeetha.M, "To provide a secured access control using combined hybrid Key-

Ciphertext Attribute based encryption (KC-ABE)," in IEEE INTERNATIONAL CONFERENCE ON

INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING,

Srivilliputhur, India, 2017, pp. 1-4.

G.B.V.PADMANADH P.L.DEVI, "Dynamic Broadcast Encryption Techniques for Groups in the

Cloud," International Journal of Scientific Engineering and Technology Research, vol. 3, no. 31, pp.

-6262, October,2014.

التنزيلات

منشور

2023-03-01