Results 1 - 10
of
13
Enabling Cloud Storage Auditing With Key-Exposure Resistance
- IEEE Transactions on Information Forensics and Security
, 2015
"... Abstract-Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
(Show Context)
Abstract-Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings at the client. If such a secret key for auditing is exposed, most of the current auditing protocols would inevitably become unable to work. In this paper, we focus on this new aspect of cloud storage auditing. We investigate how to reduce the damage of the client's key exposure in cloud storage auditing, and give the first practical solution for this new problem setting. We formalize the definition and the security model of auditing protocol with key-exposure resilience and propose such a protocol. In our design, we employ the binary tree structure and the pre-order traversal technique to update the secret keys for the client. We also develop a novel authenticator construction to support the forward security and the property of blockless verifiability. The security proof and the performance analysis show that our proposed protocol is secure and efficient.
UNIVERSITY OF BEIRA INTERIOR Engineering Secure and Efcient Storage of Multimedia Content in Public Cloud Environments Using Joint Compression and Encryption
, 2013
"... ii Dissertation prepared at University of Beira Interior and at Instituto de Telecomunicações, within Multimedia Signal Processing – Covilhã Group, and submitted for defense in a public examination session at University of Beira Interior. ..."
Abstract
- Add to MetaCart
(Show Context)
ii Dissertation prepared at University of Beira Interior and at Instituto de Telecomunicações, within Multimedia Signal Processing – Covilhã Group, and submitted for defense in a public examination session at University of Beira Interior.
Effective Secure Storage and Retrieve In Cloud Computing
"... Abstract-In Cloud computing, user can remotely store and retrieve their data based on-demand service, without the burden of local data storage and maintenance. However, the protection of the confidential data processed and generated during the computation is becoming the major security concern. The ..."
Abstract
- Add to MetaCart
Abstract-In Cloud computing, user can remotely store and retrieve their data based on-demand service, without the burden of local data storage and maintenance. However, the protection of the confidential data processed and generated during the computation is becoming the major security concern. The main objective of cloud computing enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. The main concern of this paper is optimal storing, retrieval of data with effective security in cloud computing. The proposed methodology suggests the encryption of the files to be uploaded on the cloud. The integrity and confidentiality of the data uploaded by the user is ensured doubly by not only encrypting it but also providing access to the data only on successful authentication. The proposed system takes care of data security while it is in transit and also has mechanisms to support verification of data for correctness.
Auditability-Aware Data Scheduling for Privacy Preserved Third-party Auditing
"... Cloud Computing is one of the top technology concepts. It has many names, including: grid computing, utility computing, and on-demand computing. The term "cloud computing" has at its core a single element: computing services are delivered over the Internet, on demand, from a remote locati ..."
Abstract
- Add to MetaCart
Cloud Computing is one of the top technology concepts. It has many names, including: grid computing, utility computing, and on-demand computing. The term "cloud computing" has at its core a single element: computing services are delivered over the Internet, on demand, from a remote location, rather that residing on one"s own desktop, laptop, mobile device or even on an organization"s servers. For organizations, this would mean that for a set or variable, usage-based fee or even possibly for free it would contract with a provider to deliver applications, computing power and storage via web. Cloud storage plays an important role in the technology buzz -cloud computing, in which clients can store their data at cloud servers and can be accessed anywhere, any time and on any devices. This opens up the threat on the data which client is storing on the cloud as it has to stored and accessed via Internet.
A SURVEY ON SECURED STORAGE OF DATA AND CONSEQUENT ISSUES IN CLOUD COMPUTING
"... ABSTRACT The term cloud is analogical to the "Internet". The cloud is coming into sharper focus as more people adopt cloud services and gain experience that can be shared with others. As uses of cloud computing have extended, so has industry expertise in harnessing its prospective. In add ..."
Abstract
- Add to MetaCart
ABSTRACT The term cloud is analogical to the "Internet". The cloud is coming into sharper focus as more people adopt cloud services and gain experience that can be shared with others. As uses of cloud computing have extended, so has industry expertise in harnessing its prospective. In addition to serving as an underlying infrastructural pillar of the internet, the cloud now supports a collection of services and applications. A number of benefits are regularly mentioned by cloud providers and customers, including reduced capital costs, economies of scale, time savings, flexibility, and scalability. Yet, organizations that consider cloud computing have also expressed a number of security concerns. In multiple studies over the past years, security and privacy are commonly cited as top concerns and the advantage of moving from single cloud to multiple clouds are analyzed and the comparison table of different cloud tools is studied in this paper.
Research Article Towards Dynamic Remote Data Auditing in Computational Clouds
, 2014
"... Copyright © 2014 Mehdi Sookhak et al.This is an open access article distributed under the Creative CommonsAttribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Cloud computing is a significant shift of computa ..."
Abstract
- Add to MetaCart
(Show Context)
Copyright © 2014 Mehdi Sookhak et al.This is an open access article distributed under the Creative CommonsAttribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Cloud computing is a significant shift of computational paradigmwhere computing as a utility and storing data remotely have a great potential. Enterprise and businesses are nowmore interested in outsourcing their data to the cloud to lessen the burden of local data storage andmaintenance. However, the outsourced data and the computation outcomes are not continuously trustworthy due to the lack of control and physical possession of the data owners. To better streamline this issue, researchers have now focused on designing remote data auditing (RDA) techniques.Themajority of these techniques, however, are only applicable for static archive data and are not subject to audit the dynamically updated outsourced data.We propose an effectual RDA technique based on algebraic signature properties for cloud storage system and also present a new data structure capable of efficiently supporting dynamic data operations like append, insert, modify, and delete. Moreover, this data structure empowers our method to be applicable for large-scale data withminimum computation cost.The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server. 1.
Research Article A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage
"... Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and con ..."
Abstract
- Add to MetaCart
(Show Context)
Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage.The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. 1.
A Survey on the Architectures of Data Security in Cloud Storage Infrastructure
"... Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables ..."
Abstract
- Add to MetaCart
Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data to the cloud in a rapid and secure manner. It assists activities and government agencies considerably decrease their economic overhead of data organization, as they can store their data endorsement vaguely to third-party cloud storage sources than preserving the data centers on their personal. Cloud storage allows users to accumulate their data at a remote location and have the on-demand high superiority cloud requests without the burden of restricted hardware and software organization. Along with the widespread benefits on cloud computing, however, security issues with cloud data storage are arising in terms of confidentiality, integrity and reliability. Although the profits are obvious, such a service is also turning down user’s corporeal control of their outsourced data, which unavoidably facades novel security dangers towards the accuracy of the data in cloud. This paper provides a comprehensive survey of major security issues that exists in cloud data storage. We also conduct extensive empirical studies and analysis of different techniques which provides security fortification for outsourced data in cloud computing environment.
engineering Academy Ambi,
"... The cloud provides storage for user to store their data remotely. But there is a problem with the auditing protocol, which was proposed. There is a new paradigm of storage service, which makes the integrity protection for outsourced data. There are also other integrity auditing protocols that has be ..."
Abstract
- Add to MetaCart
(Show Context)
The cloud provides storage for user to store their data remotely. But there is a problem with the auditing protocol, which was proposed. There is a new paradigm of storage service, which makes the integrity protection for outsourced data. There are also other integrity auditing protocols that has been already proposed but their focus was singleton cloud storage. These protocols don’t support batch editing of cloud storage. There is a another auditing protocol for public which will provide integrity of multi-cloud storage. In this protocol there is a third party auditor which will simultaneously verify multiple auditing requests from different users on different storage of data files or different cloud storage servers. This protocol will achieve quick identification of corrupted data by implementing recoverable coding approach and homomorphicciphertext verification. It will also provide privacy preserving public auditing for data integrity. The total editing time can be reduced by batch auditing protocol and communication cost can be maintained low using same protocol. Analysis of extended security and performance shows this protocol is efficient and secure.
Designing Efficient Security Technique for Data Storage in Cloud Computing
"... Cloud computing is an environment in which data owner move data from local system to cloud storage, next job of cloud service provider (CSP) to store that data and provide it to the user on their demand. In this simplest environment exist various security risk on cloud storage because it consist sen ..."
Abstract
- Add to MetaCart
(Show Context)
Cloud computing is an environment in which data owner move data from local system to cloud storage, next job of cloud service provider (CSP) to store that data and provide it to the user on their demand. In this simplest environment exist various security risk on cloud storage because it consist sensitive data of owner, sometime it may happened cloud services provide is dishonest. On the brief view it is clear there is various risk on cloud data storage. In this paper firstly introduce recycle storage method for reliability of data and for improving the performance and security concern proposed audit storage system. Index term- Cloud computing, security risk, recycle storage, audit storage. 1.