Data possession with outsourced data transfer

被引:0
|
作者
Suraj, M. Naga [1 ]
Ariyamala, Ms. [1 ]
机构
[1] Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India
来源
Test Engineering and Management | 2019年 / 81卷 / 11-12期
关键词
Network security - Public key cryptography - Cloud computing;
D O I
暂无
中图分类号
学科分类号
摘要
On rapid improvement of cloud computing, large enterprises would like to update and reserve data in the public cloud. Where business parts of organization are brought by other owner, similar data would sent to required system. In normal, computation cost of data sent to the cloud. The process for study data importance with outcome data sending. First time, novel concept, by taking utilization of DTPDP, the accompanying three security prerequisites can be satisfied other un-obtained information security of gained endeavour can be guaranteed the acquired information trustworthiness and protection can be guaranteed the information transferability's calculation can be redistributed to the general population cloud servers. For the security idea of DT-PDP, we give its inspiration, framework model and security model. At that point, we plan a solid DT-PDP conspire dependent on the bilinear pairings. © 2020 Mattingley Publishing. All rights reserved.
引用
收藏
页码:5399 / 5401
相关论文
共 50 条
  • [21] On Deletion of Outsourced Data in Cloud Computing
    Mo, Zhen
    Xiao, Qingjun
    Zhou, Yian
    Chen, Shigang
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 344 - 351
  • [22] A Provable Data Possession Scheme with Data Hierarchy in Cloud
    Lin, Changlu
    Luo, Fucai
    Wang, Huaxiong
    Zhu, Yan
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 301 - 321
  • [23] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [24] Remote Data Checking Using Provable Data Possession
    Ateniese, Giuseppe
    Burns, Randal
    Curtmola, Reza
    Herring, Joseph
    Khan, Osama
    Kissner, Lea
    Peterson, Zachary
    Song, Dawn
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [25] Delegable Provable Data Possession for Remote Data in the Clouds
    Shen, Shiuan-Tzuo
    Tzeng, Wen-Guey
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 93 - 111
  • [26] Geometric data perturbation for privacy preserving outsourced data mining
    Keke Chen
    Ling Liu
    Knowledge and Information Systems, 2011, 29 : 657 - 695
  • [27] A Scheme for Verifying the Integrity of Outsourced Data
    Wang Xiaoming
    Yu Fang
    Un Yanchun
    Gan Qingqing
    Wu Daini
    CHINA COMMUNICATIONS, 2015, 12 (11) : 188 - 195
  • [28] Enabling Secure Outsourced Cloud Data
    Sankareeswari, G.
    Selvi, S.
    Vidhyalakshmi, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [29] Audit Outsourced Data in Internet of Things
    Hou, Gaopan
    Ma, Jianfeng
    Li, Jiayi
    Liang, Chen
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [30] Key Management for Outsourced Data Security
    PEI Bei
    CHEN Changsong
    WAN Changsheng
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 449 - 454