Secure Disintegration Protocol for Privacy Preserving Cloud Storage

被引:0
|
作者
Bharat S. Rawal
V. Vijayakumar
Gunasekaran Manogaran
R. Varatharajan
Naveen Chilamkurti
机构
[1] Pennsylvania State University,Department of Information Sciences and Technology
[2] VIT University,School of Computing Science and Engineering
[3] University of California,Department of Computer Science and Computer Engineering
[4] Sri Ramanujar Engineering College,undefined
[5] La Trobe University,undefined
来源
关键词
Cloud computing; Cloud service provider; Security; Confidentiality; Encryption; RAID;
D O I
暂无
中图分类号
学科分类号
摘要
Cloud service providers offer infrastructure, network services, and software applications in the cloud. The cloud services are hosted in a data center that can be used by users with the help of network connectivity. Hence, there is a need for providing security and integrity in cloud resources. Most security instruments have a finite rate of failure, and the intrusion comes with more complex and sophisticated techniques; the security failure rates are skyrocketing. In this paper, we have proposed a secure disintegration protocol (SDP) for the protection of privacy on-site and in the cloud. The architecture presented in this paper is used for cloud storage, and it is used in conjunction with our unique data compression and encoding technique. Probabilistic analysis is used for calculating the intrusion tolerance abilities for the SDP.
引用
收藏
页码:1161 / 1177
页数:16
相关论文
共 50 条
  • [1] Secure Disintegration Protocol for Privacy Preserving Cloud Storage
    Rawal, Bharat S.
    Vijayakumar, V.
    Manogaran, Gunasekaran
    Varatharajan, R.
    Chilamkurti, Naveen
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (02) : 1161 - 1177
  • [2] Privacy Preserving Data Auditing Protocol for Secure Storage in Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    [J]. 2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 2725 - 2729
  • [3] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [4] Secure and privacy preserving keyword searching for cloud storage services
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 927 - 933
  • [5] Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
    Zhou, Jun
    Dong, Xiaolei
    Cao, Zhenfu
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1299 - 1314
  • [6] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    [J]. Cluster Computing, 2019, 22 : 9767 - 9775
  • [7] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [8] Secure and privacy-preserving data storage service in public cloud
    [J]. Li, Hui, 1600, Science Press (51):
  • [9] Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
    Liu, Jia-Nan
    Luo, Xizhao
    Weng, Jian
    Yang, Anjia
    Wang, Xu An
    Li, Ming
    Lin, Xiaodong
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1518 - 1531
  • [10] Cloud Storage System Enabling Secure Privacy Preserving Third Party Audit
    Rewadkar, D. N.
    Ghatage, Suchita Y.
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 695 - 699