Data Security in Cloud computing and Outsourced Databases

被引:0
|
作者
Bhukya, ShankarNayak [1 ]
Pabboju, Suresh [2 ]
Sharma, K. Venkatesh [3 ]
机构
[1] Osmania Univ, Hyderabad, TS, India
[2] Osmania Univ, CBIT, Hyderabad, Telangana, India
[3] Sri Indu Coll Engn & Technl, Sheriguda, Telangana, India
关键词
Cloud Computing; Security; Trust ability;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking supports large data sets in widely distributed storage systems. It is also superior in performance by minimizing the use of expensive publickey cryptography in metadata management. We present the architecture and implementation of various SHAROES components and our experiments demonstrate performance superior to other proposals by over 40% on a number of benchmarks.
引用
收藏
页码:2458 / 2462
页数:5
相关论文
共 50 条
  • [1] A Density-aware Data Encryption Scheme for Outsourced Databases in Cloud Computing
    Yoon, Min
    Jang, Miyoung
    Shin, Young-Sung
    Chang, Jae-Woo
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1097 - 1104
  • [2] On Deletion of Outsourced Data in Cloud Computing
    Mo, Zhen
    Xiao, Qingjun
    Zhou, Yian
    Chen, Shigang
    [J]. 2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 344 - 351
  • [3] Data Security and Privacy for Outsourced Data in the Cloud
    Sahin, Cetin
    El Abbadi, Amr
    [J]. 2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1731 - 1734
  • [4] Study on the Security of the Databases in Cloud Computing Environment
    Gele, Aori
    [J]. COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 473 - 476
  • [5] Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Jin
    Wong, Duncan S.
    Li, Hui
    You, Ilsun
    [J]. INFORMATION SCIENCES, 2017, 379 : 42 - 61
  • [6] A Survey on the Integrity Checking of Outsourced Data In Cloud Computing
    Zhao, Haichun
    Zheng, Xuefeng
    [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1650 - 1656
  • [7] IoT data security in outsourced databases: A survey of verifiable database
    Chen, Ailin
    Yu, Shaoyuan
    Yang, Xinyi
    Huang, Ding
    Ren, Yongjun
    [J]. HELIYON, 2024, 10 (07)
  • [8] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [9] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    [J]. 2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [10] Data security in cloud computing
    Meng, Du
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813