Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage
dc.authorid | kumar, pankaj/0000-0002-4589-3573 | |
dc.authorid | Susilo, Willy/0000-0002-1562-5105 | |
dc.contributor.author | Gautam, Deepika | |
dc.contributor.author | Prajapat, Sunil | |
dc.contributor.author | Kumar, Pankaj | |
dc.contributor.author | Das, Ashok Kumar | |
dc.contributor.author | Cengiz, Korhan | |
dc.contributor.author | Susilo, Willy | |
dc.date.accessioned | 2024-05-19T14:40:10Z | |
dc.date.available | 2024-05-19T14:40:10Z | |
dc.date.issued | 2024 | |
dc.department | İstinye Üniversitesi | en_US |
dc.description.abstract | With the escalation of multimedia data, cloud technology has played a very important role in its management with its promising computing and storage capabilities. Cloud computing leverages high scalability, resources, and on-demand services, which have a remarkable impact on assisting multimedia data storage. Meanwhile, any alteration in the outsourced multimedia data is a severe menace. Numerous researchers have focused on providing validation of integrity through the auditing mechanism. Regrettably, their mechanisms are focused on the traditional public-key cryptosystem and cannot withstand quantum attacks. Additionally, the centralised approach of completely relying on a third-party auditor (TPA) of existing mechanisms may lead to biased auditing results. Hence, employing the advantage of resistance against quantum attack and removing the liability of certificates with lattice cryptography and an identity-based cryptosystem, we have presented a new auditing framework by utilising blockchain technology. Blockchain technology is employed in order to track the activities of the cloud service provider and TPA, resulting less dependency on TPA. Security analysis portrays security of the framework under the random oracle model, which depends is based on the Shortest Integer Solution (SIS) problem of the lattices. Reduced computation, communication and storage overheads with efficient features and performance is observed for the proposed mechanism through analysis conducted with similar mechanisms. As a result, better operability is achieved by the proposed mechanism. | en_US |
dc.identifier.doi | 10.1007/s10586-024-04412-8 | |
dc.identifier.issn | 1386-7857 | |
dc.identifier.issn | 1573-7543 | |
dc.identifier.scopus | 2-s2.0-85189494206 | en_US |
dc.identifier.scopusquality | Q2 | en_US |
dc.identifier.uri | https://doi.org10.1007/s10586-024-04412-8 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12713/4918 | |
dc.identifier.wos | WOS:001197922800004 | en_US |
dc.identifier.wosquality | N/A | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartof | Cluster Computing-The Journal of Networks Software Tools and Applications | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.snmz | 20240519_ka | en_US |
dc.subject | Cloud Storage | en_US |
dc.subject | Public Auditing | en_US |
dc.subject | Multimedia Data | en_US |
dc.subject | Shortest Integer Solution | en_US |
dc.subject | Post-Quantum Computing | en_US |
dc.subject | Blockchain | en_US |
dc.subject | Security | en_US |
dc.title | Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage | en_US |
dc.type | Article | en_US |