Assuring Correctness for Securing Outsourced Data Repository in Cloud Environment

被引:0
|
作者
Priya, Durga G. [1 ]
Prathibha, Soma [1 ]
机构
[1] Sri Sairam Engn Coll, Dept Informat Technol, ME Comp & Commun, Madras, Tamil Nadu, India
关键词
Data security; Audit service; Dynamic operations; Certificate Authority; Time stamp; Hash Verification;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The data storage in the cloud environment offers users with infrastructure affability, quicker deployment of applications and data, cost effective, acclimation of cloud resources to real needs, enhanced productivity, etc. Inspite of these beneficial factors, there are several disadvantages to the widespread adoption of cloud computing remain. Among them, surity towards the exactness of the outsourced data and matter of concealment takes the major part. In order to avoid a security hazard for the outsourced data, we propose the dynamic audit services that enable integrity verification of data. An Interactive Proof System (IPS) is introduced to protect the privacy of the data. The DataOwner stores the large number of data in the cloud after encrypting the data for auditing purpose. An Authorized Application (AA), manipulates the outsourced data and the AA helps the cloud users to access the services. Our system provides secure auditing while the data owner, outsourcing the data in the cloud. And after performing auditing operations, security solutions are enhanced for the purpose of detecting malicious users with the help of Certificate Authority, using the hash values and a TimeStamp.
引用
收藏
页码:1745 / 1748
页数:4
相关论文
共 50 条
  • [31] Security Model for Securing Data on Cloud
    Madni, Ahmad Fayyaz
    Shah, Munam Ali
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 206 - 211
  • [32] Survey on securing data storage in the cloud
    Huang, Chun-Ting
    Huang, Lei
    Qin, Zhongyuan
    Yuan, Hang
    Zhou, Lan
    Varadharajan, Vijay
    Kuo, C. C. Jay
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2014, 3
  • [33] Fast and Efficient Data Masking Method for Securing Image Over Cloud Computing Environment
    Siddartha B.K.
    Ravikumar G.K.
    Recent Advances in Computer Science and Communications, 2022, 15 (04) : 636 - 648
  • [34] Hybrid encryption framework for securing big data storage in multi-cloud environment
    G. Viswanath
    P. Venkata Krishna
    Evolutionary Intelligence, 2021, 14 : 691 - 698
  • [35] Hybrid encryption framework for securing big data storage in multi-cloud environment
    Viswanath, G.
    Krishna, P. Venkata
    EVOLUTIONARY INTELLIGENCE, 2021, 14 (02) : 691 - 698
  • [36] Securely Outsourced Face Recognition under Federated Cloud Environment
    Cai, Yunlu
    Tang, Chunming
    2016 15TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2016, : 269 - 276
  • [37] An out-of-band mobile authenticating mechanism for controlling access to data outsourced in the mobile cloud environment
    Yadav S.K.
    Saroha N.
    Sharma K.
    International Journal of Innovative Computing and Applications, 2019, 10 (3-4) : 127 - 137
  • [38] TOWARDS SECURE AUDIT SERVICES FOR OUTSOURCED DATA IN CLOUD
    Sumalatha, M. R.
    Hemalathaa, S.
    Monika, R.
    Ahila, C.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [39] A Survey on Assured Deletion of Outsourced Data in Cloud Storage
    Ren Z.-W.
    Li X.-T.
    Wang L.-N.
    Tong Y.
    Xu S.-W.
    Ding W.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (10): : 2542 - 2560
  • [40] Selective Sharing of Outsourced Encrypted Data in Cloud Environments
    Sifah, Emmanuel Boateng
    Xia, Qi
    Xia, Hu
    Agyekum, Kwame Opuni-Boachie Obour
    Acheampong, Kingsley Nketia
    Cobblah, Christian Nii Aflah
    Gao, Jianbin
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (18) : 14141 - 14155