An Approach for Storage Security in Cloud Computing- A Survey 

Abstract

The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform providers, such as Amazon, Google, and Microsoft, more and more cloud application providers are emerging which are dedicated to offering more accessible and user friendly data storage services to cloud customers. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system. We propose a threshold proxy re-encryption scheme and integrate it with decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back 

Authors and Affiliations

W. Sharon Inbaran , G. Shenbaga Moorthy , C. Kumar Charlie Paul

Keywords

Related Articles

Spectrum of Cyber threats & Available Control Mechanisms  

The Internet is undoubtedly the largest public data network enabling and facilitating both personal & business communications worldwide. Wireless networking has experienced a tremendous growth becoming an integral...

Multispectral Palm Image Fusion: A Critical Review  

Hand biometrics, including fingerprint, palmprint, hand geometry and hand vein pattern, have obtained extensive attention in recent years. Physiologically, skin is a complex multi-layered tissue consisting of vario...

Review of issues in automatic labelling of formatted document 

The labelling framework, which is proposed to label topic models, essentially consists of a multinomial word distribution, a set of candidate labels, and a context collection. Thus it could be applied to any text m...

A Maintainability Estimation Model and Metrics for Object-Oriented Design (MOOD)  

Maintainability is that phase which may help the designer for improving the quality of the software system before deliver to a customer. This paper uses a multivariate linear model, which estimates the maintainabil...

Anomaly Detection using Support Vector Machine

Support vector machine are among the most well known supervised anomaly detection technique, which are very efficient in handling large and high dimensional dataset. SVM, a powerful machine method developed from statisti...

Download PDF file
  • EP ID EP120567
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

W. Sharon Inbaran, G. Shenbaga Moorthy, C. Kumar Charlie Paul (2013). An Approach for Storage Security in Cloud Computing- A Survey . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(1), 174-179. https://europub.co.uk/articles/-A-120567