An Approach for Storage Security in Cloud Computing- A Survey
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform providers, such as Amazon, Google, and Microsoft, more and more cloud application providers are emerging which are dedicated to offering more accessible and user friendly data storage services to cloud customers. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system. We propose a threshold proxy re-encryption scheme and integrate it with decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back
Authors and Affiliations
W. Sharon Inbaran , G. Shenbaga Moorthy , C. Kumar Charlie Paul
Spectrum of Cyber threats & Available Control Mechanisms
The Internet is undoubtedly the largest public data network enabling and facilitating both personal & business communications worldwide. Wireless networking has experienced a tremendous growth becoming an integral...
Multispectral Palm Image Fusion: A Critical Review
Hand biometrics, including fingerprint, palmprint, hand geometry and hand vein pattern, have obtained extensive attention in recent years. Physiologically, skin is a complex multi-layered tissue consisting of vario...
Review of issues in automatic labelling of formatted document
The labelling framework, which is proposed to label topic models, essentially consists of a multinomial word distribution, a set of candidate labels, and a context collection. Thus it could be applied to any text m...
A Maintainability Estimation Model and Metrics for Object-Oriented Design (MOOD)
Maintainability is that phase which may help the designer for improving the quality of the software system before deliver to a customer. This paper uses a multivariate linear model, which estimates the maintainabil...
Anomaly Detection using Support Vector Machine
Support vector machine are among the most well known supervised anomaly detection technique, which are very efficient in handling large and high dimensional dataset. SVM, a powerful machine method developed from statisti...