Secure Data Storage Using Erasure-Coding In Cloud Environment

被引:0
|
作者
Vasanthi, G. [1 ]
Chinnasamy, P. [2 ]
Kanagavalli, N. [3 ]
Ramalingam, M. [1 ]
机构
[1] Mailam Engn Coll, Dept Informat Technol, Mailam, India
[2] Sri Shakthi Inst Engn & Technol, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[3] Rajalakshmi Inst Technol, Dept CSE, Chennai, Tamil Nadu, India
关键词
cloud computing security; online erasure code algorithm;
D O I
10.1109/ICCCI50826.2021.9402639
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In present era, protection has become a much more beneficial move. This article expresses how cloud computing is offered services with protection. The developed system is mainly focused in third-party authentication (TPA), in this verification process, where administrator behaves as an interface between the customer and the TPA. Many storage technologies leverage storage space by third parties. The main objective of this paper is by using the digital exclusion coding method shown in the data center to safeguard data. Throughout this methodology, to use a unique dynamic secure key, as well as every block of data is shielded. The TPA verifies the information with the corresponding privacy key when the server program uses some process in the system or information at the instance so that the data is much more confidential and private.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Extending DIRAC File Management with Erasure-Coding for efficient storage.
    Skipsey, Samuel Cadellin
    Todev, Paulin
    Britton, David
    Crooks, David
    Roy, Gareth
    21ST INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP2015), PARTS 1-9, 2015, 664
  • [2] Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques
    Sengupta, Binanda
    Dixit, Akanksha
    Ruj, Sushmita
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2090 - 2101
  • [3] Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding
    Sengupta, Binanda
    Ruj, Sushmita
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 107 - 118
  • [4] A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code
    Mugisha, Emmy
    Zhang, Gongxuan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 436 - 453
  • [5] Division of data in cloud environment for secure data storage
    Manjula, S.
    Devi, M. Indra
    Swathiya, R.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGIES AND INTELLIGENT DATA ENGINEERING (ICCTIDE'16), 2016,
  • [6] Provisioning CSD-based Storage Systems with Erasure-coding Offloaded to the CSD
    Byun, Hongsu
    Jamil, Safdar
    Ryu, Junghyun
    Park, Sungyong
    Lee, Myungcheol
    Park, Sung-Soon
    Kim, Youngjae
    JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2024, 24 (01) : 8 - 17
  • [7] A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
    Lin, Hsiao-Ying
    Tzeng, Wen-Guey
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 995 - 1003
  • [8] Secure Multi-Key File-Sharing for Cloud Storage with Erasure Coding
    Wu, Chun-Hsin
    Wang, Pai-Hsing
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (CITS), 2014,
  • [9] Erasure Coding-Oriented Data Update for Cloud Storage: A Survey
    Xiao, Yifei
    Zhou, Shijie
    Zhong, Linpeng
    IEEE ACCESS, 2020, 8 (08): : 227982 - 227998
  • [10] Erasure Coding for Cloud Storage Systems: A Survey
    Li, Jun
    Li, Baochun
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (03) : 259 - 272