Assuring Correctness for Securing Outsourced Data Repository in Cloud Environment

被引:0
|
作者
Priya, Durga G. [1 ]
Prathibha, Soma [1 ]
机构
[1] Sri Sairam Engn Coll, Dept Informat Technol, ME Comp & Commun, Madras, Tamil Nadu, India
关键词
Data security; Audit service; Dynamic operations; Certificate Authority; Time stamp; Hash Verification;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The data storage in the cloud environment offers users with infrastructure affability, quicker deployment of applications and data, cost effective, acclimation of cloud resources to real needs, enhanced productivity, etc. Inspite of these beneficial factors, there are several disadvantages to the widespread adoption of cloud computing remain. Among them, surity towards the exactness of the outsourced data and matter of concealment takes the major part. In order to avoid a security hazard for the outsourced data, we propose the dynamic audit services that enable integrity verification of data. An Interactive Proof System (IPS) is introduced to protect the privacy of the data. The DataOwner stores the large number of data in the cloud after encrypting the data for auditing purpose. An Authorized Application (AA), manipulates the outsourced data and the AA helps the cloud users to access the services. Our system provides secure auditing while the data owner, outsourcing the data in the cloud. And after performing auditing operations, security solutions are enhanced for the purpose of detecting malicious users with the help of Certificate Authority, using the hash values and a TimeStamp.
引用
收藏
页码:1745 / 1748
页数:4
相关论文
共 50 条
  • [1] Securing Public Data Storage in Cloud Environment
    Boopathy, D.
    Sundaresan, M.
    ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 : 555 - 562
  • [2] Data integrity verification of the outsourced big data in the cloud environment: A survey
    Zhou, Lei
    Fu, Anmin
    Yu, Shui
    Su, Mang
    Kuang, Boyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 122 : 1 - 15
  • [3] Securing Speech Noise Reduction in Outsourced Environment
    Yakubu, Abukari M.
    Maddage, Namunu C.
    Atrey, Pradeep K.
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2017, 13 (04)
  • [4] Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment
    Mao, Jian
    Cui, Jian
    Zhang, Yan
    Ma, Hanjun
    Zhang, Jianhong
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2016, 2016, 9798 : 511 - 523
  • [5] Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
    Sultan, Nazatul Haque
    Kaaniche, Nesrine
    Laurent, Maryline
    Barbhuiya, Ferdous Ahmed
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 216 - 233
  • [6] Securing the Payment Card Data on Cloud environment: Issues & perspectives
    El Alloussi, Hassan
    Fetjah, Laila
    Chaichaa, Abdelhak
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (11): : 14 - 20
  • [7] Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing
    Vyas, Ronak
    Singh, Alok
    Singh, Jolly
    Soni, Gunjan
    Purushothama, B. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 66 - 77
  • [8] A Cost Effective Dynamic Auditing Scheme for Outsourced Data Storage in Cloud Environment
    Daniel, Esther
    Vasanthi, N. A.
    2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN GREEN ENERGY AND HEALTHCARE TECHNOLOGIES (IGEHT), 2017,
  • [9] Data Security and Privacy for Outsourced Data in the Cloud
    Sahin, Cetin
    El Abbadi, Amr
    2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1731 - 1734
  • [10] On Deletion of Outsourced Data in Cloud Computing
    Mo, Zhen
    Xiao, Qingjun
    Zhou, Yian
    Chen, Shigang
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 344 - 351