Secure Data Storage in Cloud

Abstract

Now-a-days, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. Cloud computing can be said as the long term vision of computing as a utility, where the owners of data can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. Due to this, many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. In this paper, we first design an framework for cloud storage systems and propose an efficient and privacy-preserving auditing protocol. Then, we expand our auditing protocol to support the data dynamic operations, which is efficient and possibly secure in the random oracle model. We expand our auditing protocol to support batch auditing for both multiple owners and multiple clouds, without using any trusted organizer. The simulation results show that our proposed auditing protocols are secure and efficient, especially it reduce the computation cost of the auditor. Such an auditing service not only helps save data owners computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. We define different approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality.

Authors and Affiliations

Kiran . , Shilpa Sharma

Keywords

Related Articles

Experimental analysis of pine needle briquettes using different binding material

The study is undertaken to investigate the Thermal properties of pine needle in the preparation of biomass briquettes. Forest fires are the annual phenomenon in Himalayan region as the forests are dense and catch fire e...

Wardowski Type Fixed Point Theorems in Complete Metric Spaces

In this paper, we state and prove Wardowski type fixed point theorems in metric space by using a modified generalized F-contraction maps. These theorems extend other well-known fundamental metrical fixed point theorems...

10-20 GHz CMOS Low Noise Amplifier with Coplanar Line for Wireless Communication

Recently, CMOS amplifiers remain to be challenge at radio frequencies. In this paper, a 10-20GHz CMOS Low noise amplifier (LNA) with 50Ω matched coplanar line is proposed. This new technique may improve the integration...

Enhancement of Hidden Objects Due To Shadow of Obstacles in Urban Areas

In accordance with the characteristics of urban high- resolution color remote sensing images, we put forward an object- oriented shadow detection and removal method. In this method, shadow features are taken into consid...

Families of Solutions of a Cubic Diophantine Equation

The ternary cubic equation 􀢻(􀢞􀫛 + 􀢟􀫛) + 􀢞 + 􀢟 + 􀫚 = (􀫛􀢻 − 􀫚)􀢞􀢟 + 􀢻(􀢻 + 􀫛)􀢠􀫜 such that 􀢻 ∈ 􀡺, is considered for determining its non-zero distinct integral solutions. Different patterns of integral solutions to the ternar...

Download PDF file
  • EP ID EP24086
  • DOI -
  • Views 299
  • Downloads 9

How To Cite

Kiran . , Shilpa Sharma (2017). Secure Data Storage in Cloud. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24086