CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Auditing Mechanism for Ensuring Data Storage Security in Cloud Computing

by J.aparna, R.sathiyaraj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 6
Year of Publication: 2014
Authors: J.aparna, R.sathiyaraj
10.5120/18384-9625

J.aparna, R.sathiyaraj . Auditing Mechanism for Ensuring Data Storage Security in Cloud Computing. International Journal of Computer Applications. 105, 6 ( November 2014), 33-38. DOI=10.5120/18384-9625

@article{ 10.5120/18384-9625,
author = { J.aparna, R.sathiyaraj },
title = { Auditing Mechanism for Ensuring Data Storage Security in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 6 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number6/18384-9625/ },
doi = { 10.5120/18384-9625 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:02.164102+05:30
%A J.aparna
%A R.sathiyaraj
%T Auditing Mechanism for Ensuring Data Storage Security in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 6
%P 33-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day's most of the firms are shown interested to place their data in a cloud based networks because of its utilities and problems with traditional data storage tools. If we are storing data outside of its environment means outsourced it leads to privacy issues. Also considerable factor is that security here users worried about integrity and accountability. Security is a considerable issue for this type of data centers. Security consist set of policies, applications and infrastructure. In this project we propose a model to overcome these issues, outsourced data are verified by trusted third party persons to ensure its integrity. This auditing was done because most of the data's are outsourced. Next it will be focused on security and performance analysis issues this was done by auditors simultaneously without over burden to the users.

References
  1. C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Storage Security in Cloud Computing," Proc. IEEE INFOCOM '10, Mar. 2010.
  2. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "Above the Clouds: A Berkeley View of Cloud Computing," Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.
  3. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.
  4. C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditable Secure Cloud Data Storage Services," IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/Aug. 2010.
  5. Y. Zhu, H. Wang, Z. Hu, G. -J. Ahn, H. Hu, and S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," Cryptology reprints Archive, Report 2010/234, 2010.
  6. M. Bellare and G. Neven, "Multi-Signatures in the Plain PublicKey Model and a General Forking Lemma,"Proc. ACM Conf. Computer and Comm. Security (CCS),pp. 390-399, 2006.
  7. G. Ateniese, S. Kamara, and J. Katz, "Proofs of Storage from Homomorphic Identification Protocols,"Proc. 15th Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT),pp. 319-333, 2009.
  8. C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession,"Proc. ACM Conf. Computer and Comm. Security (CCS'09), pp. 213-222, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Public audit ability privacy-preserving cryptographic protocols cloud computing Data storage