Experimental Analysis of Sharing Data in Cloud with Verification System

Ankit Gupta, M Prashanti

Abstract


Cloud computing is a rising innovation with promising future is winding up increasingly prominent these days. It permits clients with boundless asset. These days, re-appropriating calculation has pulled in much consideration and been inquired about broadly. Cloud storage is a standout amongst the most noteworthy services of cloud computing. In spite of the fact that cloud computing has different preferences to clients, it brings new security testing issues. One of the imperative security issues is the means by which to successfully check the uprightness of the cloud data put away in the cloud. In the ongoing years, evaluating conventions for cloud storages has been proposed to bargain the trustworthiness issue of cloud data. This paper manages distinctive examining conventions. Writing overview demonstrates that the conventions are centered around various viewpoints, for example, dynamic data tasks, security insurance of the data, the high productivity, the security assurance of the characters and the data sharing. These conventions accomplish the confirmation of cloud data respectability and accessibility and implement the nature of cloud storage service and furthermore empower on interest data rightness check for the benefit of the cloud clients.


References


D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud data protection for the masses,” Computer, IEEE, vol. 45, no. 1, pp. 39–45, Jan 2012.

C.-K. Chu, W.-T. Zhu, J. Han, J. Liu, J. Xu, and J. Zhou, “Security concerns in popular cloud storage services,” Pervasive Computing, IEEE, vol. 12, no. 4, pp. 50–57, Oct 2013.

K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409–428, 2012.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2007, pp.598–609.

J. Sun and Y. Fang, “Cross-Domain Data Sharing in Distributed Electronic Health Record Systems,” Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 6, pp. 754–764, 2010.

J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryptography based Secure EHR System for Patient Privacy and Emergency Healthcare,” in Distributed Computing Systems (ICDCS), 2011 IEEE 31st International Conference on. IEEE, 2011, pp. 373–382.

L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: A Privacy- Preserving Attribute-Based Authentication System for eHealth Networks,” in Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on. IEEE, 2012, pp. 224–233.

A. Juels and B. S. Kaliski, Jr., “PoRs: Proofs of Retrievability for Large Files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, New York, NY, USA, 2007, pp. 584– 597.

H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of Cryptology, vol. 26, no. 3, pp. 442–483, 2013.

C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy- Preserving Public Auditing for Secure Cloud Storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–275, 2013.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.