Secure Data Storage Using Erasure-Coding In Cloud Environment

被引:0
|
作者
Vasanthi, G. [1 ]
Chinnasamy, P. [2 ]
Kanagavalli, N. [3 ]
Ramalingam, M. [1 ]
机构
[1] Mailam Engn Coll, Dept Informat Technol, Mailam, India
[2] Sri Shakthi Inst Engn & Technol, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[3] Rajalakshmi Inst Technol, Dept CSE, Chennai, Tamil Nadu, India
关键词
cloud computing security; online erasure code algorithm;
D O I
10.1109/ICCCI50826.2021.9402639
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In present era, protection has become a much more beneficial move. This article expresses how cloud computing is offered services with protection. The developed system is mainly focused in third-party authentication (TPA), in this verification process, where administrator behaves as an interface between the customer and the TPA. Many storage technologies leverage storage space by third parties. The main objective of this paper is by using the digital exclusion coding method shown in the data center to safeguard data. Throughout this methodology, to use a unique dynamic secure key, as well as every block of data is shielded. The TPA verifies the information with the corresponding privacy key when the server program uses some process in the system or information at the instance so that the data is much more confidential and private.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
    Aujla, Gagangeet Singh
    Chaudhary, Rajat
    Kumar, Neeraj
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 78 - 85
  • [32] The research and prospect of secure data access control in cloud storage environment
    Li, Tengfei
    Hu, Liang
    Li, Yan
    Chu, Jianfeng
    Li, Hongtu
    Han, Hongying
    Journal of Communications, 2015, 10 (10): : 753 - 759
  • [33] A Data Transfer Method Combining Erasure-coding with Cumulative Acknowledgment for Lossy Optical Packet Switching Networks
    Ono, Maho
    Seki, Yuya
    Hashimoto, Yuusuke
    Tanigawa, Yosuke
    Hirota, Yusuke
    Tode, Hideki
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [34] Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment
    Lee, Sun-Ho
    Lee, Im-Yeong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 257 - 271
  • [35] A secure storage system over cloud storage environment
    Xue, Mao
    Xue, Wei
    Shu, Ji-Wu
    Liu, Yang
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (05): : 987 - 998
  • [36] On Data Parallelism of Erasure Coding in Distributed Storage Systems
    Li, Jun
    Li, Baochun
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 45 - 56
  • [37] Erasure-Coding Based Utility Routing in Multi-hop Wireless Networks
    Lu, Mingming
    Wu, Jie
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 329 - 338
  • [38] Secure storage of data in cloud computing
    20150500466883
    (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [39] A Secure Data Forwarding In Cloud Storage
    Prabha, K.
    Nalini, S.
    2013 INTERNATIONAL CONFERENCE ON OPTICAL IMAGING SENSOR AND SECURITY (ICOSS 2013), 2013,
  • [40] Techniques of secure storage for cloud data
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Jisuanji Xuebao/Chinese Journal of Computers, 2015, 38 (01): : 150 - 163