An Approach for Storage Security in Cloud Computing- A Survey 

Abstract

The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform providers, such as Amazon, Google, and Microsoft, more and more cloud application providers are emerging which are dedicated to offering more accessible and user friendly data storage services to cloud customers. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system. We propose a threshold proxy re-encryption scheme and integrate it with decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back 

Authors and Affiliations

W. Sharon Inbaran , G. Shenbaga Moorthy , C. Kumar Charlie Paul

Keywords

Related Articles

Wavelet Based Classification of Multispectral Satellite Image Using Fuzzy Incorporated Hierarchical Clustering With SVM Classifier 

Multispectral satellite images are more efficient and a suitable method of obtaining information about land, because it can captures an image at specific frequency across the spectrum. This spectral image can allow...

Performance Analysis of AODV and DSDV in Simulation Based Map  

In recent days Inter-Vehicle communication has fascinated many research communities and automotive industries .With the introduction of inter-vehicle communication it would be possible for vehicles to communicate...

Improving the Performance of a Single Model and Test Prioritization Strategy for Event Driven Software  

Event-driven software is very diverse, e.g., in form of Graphical User Interfaces (GUIs), Web applications, or embedded software. All EDS take sequences of events (e.g., messages and mouse-clicks) as input, change their...

IDENTIFICATION OF HUMAN THROUGH PALMPRINT: A REVIEW 

Palm Print is one of the relatively new physiological biometrics, attracted the researchers due to its stable and unique characteristics. The rich feature information of palm print offers one of the powerful means...

NETWORK MONITORING, MANAGEMENT AND ENHANCEMENT USING VPN  

In previous years, A Method fail for increasing opportunities created by devoted in Network monitoring and management. To overcome this type of situation we introduce some Tools and macros to improve the performa...

Download PDF file
  • EP ID EP120567
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

W. Sharon Inbaran, G. Shenbaga Moorthy, C. Kumar Charlie Paul (2013). An Approach for Storage Security in Cloud Computing- A Survey . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(1), 174-179. https://europub.co.uk/articles/-A-120567