Data integrity and Auditing for Secured Cloud Data Storage

D. Usha Raj, CH.Udaya Bhaskar

Abstract


Time and Trend has its own significance to build the technology smarter, better and easier to the end user.To the Better stretch of the Information Technology, the Innovation and renovation has changed computing approach to the next level. For this paper, we try giving the glimpse of the contextual virtual storage in cloud in the public data distribution.  These days cloud storage become common, but having the constrainttowards the technical advancement is the Security. If we consider behavioral aspect of the cloud data storage, we will come across much aspect. Hence,In this we have overcome the public protection in terms of the privacy towards the authorization of public audit,tag based data uploading with the help of the SecCloud and SecCLoud+ based processing with the aim to maintain the integrity and data consistency. Metadata with the protocol to prevent the leakage of the dataset, which we call it as the best to the trend of the acknowledgement based identification with the cryptographic model where ever the node to the parallel cloud distributed elastic stretchableenvironment with the high end cloud data center marinating the graphics of the flow triggering the security in the public Domain

References


B. Wang, B. Li, and H. Li, “Oruta: Privacy-Preserving PublicAuditing for Shared Data in the Cloud,” Proc. IEEE Fifth Int’l Conf.Cloud Computing, pp. 295-302, 2012.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A.Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, andM. Zaharia, “A View of Cloud Computing,” Comm. ACM,vol. 53, no. 4, pp. 50-58, Apr. 2010.

K. Ren, C. Wang, and Q. Wang, “Security Challenges for the PublicCloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.

D. Song, E. Shi, I. Fischer, and U. Shankar, “Cloud Data Protectionfor the Masses,” Computer, vol. 45, no. 1, pp. 39-45, 2012.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-PreservingPublic Auditing for Data Storage Security in Cloud Computing,”Proc. IEEE INFOCOM, pp. 525-533, 2010.

B. Wang, M. Li, S.S. Chow, and H. Li, “Computing EncryptedCloud Data Efficiently under Multiple Keys,” Proc. IEEE Conf.Comm. and Network Security (CNS ’13), pp. 90-99, 2013.

R. Rivest, A. Shamir, and L. Adleman, “A Method for ObtainingDigital Signatures and Public Key Cryptosystems,” Comm. ACM,vol. 21, no. 2, pp. 120-126, 1978.

The MD5 Message-Digest Algorithm (RFC1321). https://tools.ietf.org/html/rfc1321, 2014.

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner,Z. Peterson, and D. Song, “Provable Data Possession atUntrusted Stores,” Proc. 14th ACM Conf. Computer and Comm.Security (CCS ’07), pp. 598-610, 2007.

H. Shacham and B. Waters, “Compact Proofs of Retrievability,”Proc. 14th Int’l Conf. Theory and Application of Cryptology and InformationSecurity: Advances in Cryptology (ASIACRYPT ’08), pp. 90-107, 2008.

C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia,“Dynamic Provable Data Possession,” Proc. 16th ACM Conf. Computerand Comm. Security (CCS’09), pp. 213-222, 2009.

Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling PublicVerifiability and Data Dynamic for Storage Security in CloudComputing,” Proc. 14th European Conf. Research in Computer Security(ESORICS’09), pp. 355-370, 2009.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Ensuring Data StorageSecurity in Cloud Computing,” Proc. 17th Int’l Workshop Quality ofService (IWQoS’09), pp. 1-9, 2009.

B. Chen, R. Curtmola, G. Ateniese, and R. Burns, “Remote DataChecking for Network Coding-Based Distributed Storage Systems,”Proc. ACM Workshop Cloud Computing Security Workshop(CCSW’10), pp. 31-42, 2010.

Y. Zhu, H. Wang, Z. Hu, G.-J.Ahn, H. Hu, and S.S Yau,“Dynamic Audit Services for Integrity Verification of OutsourcedStorages in Clouds,” Proc. ACM Symp. Applied Computing(SAC’11), pp. 1550-1557, 2011.

N. Cao, S. Yu, Z. Yang, W. Lou, and Y.T. Hou, “LT Codes-BasedSecure and Reliable Cloud Storage Service,” Proc. IEEE INFOCOM,2012.

B. Wang, B. Li, and H. Li, “Certificateless Public Auditing forData Integrity in the Cloud,” Proc. IEEE Conf. Comm. and NetworkSecurity (CNS’13), pp. 276-284, 2013.

C. Wang, S.S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-PreservingPublic Auditing for Secure Cloud Storage,” IEEE Trans.Computers, vol. 62, no. 2, pp. 362-375, Feb. 2013.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.