CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

The Effective Method of Enhancing Data Security in a Cloud Storage System

by S. Eswari, S. Manikandan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 17
Year of Publication: 2015
Authors: S. Eswari, S. Manikandan
10.5120/ijca2015907100

S. Eswari, S. Manikandan . The Effective Method of Enhancing Data Security in a Cloud Storage System. International Journal of Computer Applications. 129, 17 ( November 2015), 5-9. DOI=10.5120/ijca2015907100

@article{ 10.5120/ijca2015907100,
author = { S. Eswari, S. Manikandan },
title = { The Effective Method of Enhancing Data Security in a Cloud Storage System },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 17 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number17/23163-2015907100/ },
doi = { 10.5120/ijca2015907100 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:23:39.753022+05:30
%A S. Eswari
%A S. Manikandan
%T The Effective Method of Enhancing Data Security in a Cloud Storage System
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 17
%P 5-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing presently hot topic in computing as a Service, where data owners can store their files in the cloud server to enable people to access applications and services from anywhere on the network. In these days mobile devices becoming more popular and it is difficult to extent storage in mobile devices to overcome it the cloud storage environment is provided, and it is important to provide users data and provide better service from the cloud. Here after users are not going to install applications for the services as there is less storage rather they can access Web Service. In order to make easier of rapid deployment of cloud Web service and regain security validation with outsourced services, efficient auditing that enable on-demand service validation on behalf of Service Providers have to be designed. In this article it is proposed that secure validation of cloud web service is able to help web service established globally. With service validation a trusted entity with expertise and capabilities of Service Providers do not possess can be delegated as an external audit party to assess the risk of outsourced services when needed. Such an auditing service not only helps save Clients computation resources and also to provide better Services for their Service Request. This concept describes approaches and procedures that should be brought into consideration, and outline challenges that need to be resolved for such a service validation to secure cloud service to become a proper computing.

References
  1. Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing,Zhen Chen, Wenyu Dong, Hang Li, Peng Zhang, Xinming Chen, and Junwei Cao. 2014.
  2. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  3. Qian Wang, Student Member, IEEE, Cong Wang, Student Member, IEEE, Kui Ren, Member, IEEE, Wenjing Lou, Senior Member, IEEE, and Jin Li.Robust Remote Data Checking Reza Curtmola Department of Computer Science New Jersey Institute of Technology Newark, Osama Khan Randal Burns Department of Computer Science Johns Hopkins University Baltimore.
  4. Provable Data Possession at Untrusted Stores, Giuseppe Ateniese, Randal Burns Reza, Curtmola, Joseph Herring, Lea Kissner, Zachary Peterso, Dawn Song.
  5. Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, and Wenjing Lou, Member, IEEE.
  6. Toward Publicly Auditable Secure Cloud Data Storage Services, Cong Wang and Kui Ren, Illinois Institute of Technology Wenjing Lou, Worcester Polytechnic Institute Jin Li, Illinois Institute of Technology.
  7. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Luca Ferretti, Michele Colajanni, and Mirco Marchetti 2014.
  8. Network Adaptability from Disaster Disruptions and Cascading Failures, Biswanath Mukherjee, M. Farhan Habib, and Ferhat Dikbiyik.
  9. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cheng-Kang Chu, Sherman S.M. Chow, Wen-Guey Tzeng, Jianying Zhou, and Robert H. Deng, Senior Member, IEEE, 2014.
  10. Towards Secure and Dependable Storage Services in Cloud Computing Cong Wang, Student Member, IEEE, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, Ning Cao, Student Member, IEEE, and Wenjing Lou, Senior Member, IEEE.
  11. Efficient Remote Data Possession Checking in Critical Information Infrastructures
  12. Francesc Sebe´ , Josep Domingo-Ferrer, Senior Member, IEEE, Antoni Martı´nez-Balleste ,Yves Deswarte, Member, IEEE, and Jean-Jacques Quisquater, Member, IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Third Party Auditing Cloud Server Cloud User. Private key generation.