CFP last date
20 May 2024
Reseach Article

Achieving Secure Cloud Data Storage without using of Trusted Third Party Auditor: A Review

by Hiren Patel, Dhiren Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 6
Year of Publication: 2012
Authors: Hiren Patel, Dhiren Patel
10.5120/9115-3269

Hiren Patel, Dhiren Patel . Achieving Secure Cloud Data Storage without using of Trusted Third Party Auditor: A Review. International Journal of Computer Applications. 57, 6 ( November 2012), 1-4. DOI=10.5120/9115-3269

@article{ 10.5120/9115-3269,
author = { Hiren Patel, Dhiren Patel },
title = { Achieving Secure Cloud Data Storage without using of Trusted Third Party Auditor: A Review },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 6 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number6/9115-3269/ },
doi = { 10.5120/9115-3269 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:59:42.590042+05:30
%A Hiren Patel
%A Dhiren Patel
%T Achieving Secure Cloud Data Storage without using of Trusted Third Party Auditor: A Review
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 6
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a model where computing resources are rendered on rental basis with the use of clusters of commodity computers. In one of the services offered by cloud viz. Storage as a Service, users outsource their data to cloud without having direct possession or control on it. As the cloud service provider is not completely trustworthy, it raises issues such as data security and privacy. Achieving secure cloud data storage is one of the major security issues. The issue can be addressed into two directions viz. first which makes use of trusted third party auditor (TTPA) and other which do not. In this paper, we review various recently proposed approaches to ensure data storage correctness without using TTPA

References
  1. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, V 3. 1, Nov 2011.
  2. W. Jansen, T. Grance, "Guidelines on Security and Privacy in Public Cloud Computing", NIST Special Publication 800-144, December 2011.
  3. K. Raen, C. Wang, Q. Wang, "Security Challenges for the Public Cloud", Published by IEEE Computer Society, Jan/Feb 2012.
  4. "Nine Storage-Related Attributes of an Enterprise Cloud" – A white paper from SAVVIS, A CenturyLink Company, 2011.
  5. N. Virvilis, S. Dritsas, and D. Gritzalis, "Secure Cloud Storage: Available Infrastructures and Architectures Review and Evaluation," vol. 6863, S. Furnell, C. Lambrinoudakis, and G. Pernul, Eds. Springer Berlin / Heidelberg, 2011, pp. 74-85
  6. Hiren B. Patel, Dhiren R. Patel, Bhavesh Borsania, Avi Patel, "Data Storage Security Mode for Cloud Computing", in Third International Conference on Advances in Communication, Network, and Computing – CNC 2012 organized by ACEEE. February, 2012.
  7. S. Kamara and K. Lauter, "Cryptographic cloud storage," in Proceedings of the 14th international conference on Financial cryptography and data security, 2010, pp. 136-149.
  8. C. Hota, S. Sanka, M. Rajarajan, S. Nair, "Capability-based Cryptographic Data Access Control in Cloud Computing", in International Journal of Advanced Networking and Applications, Volume 01, Issue 01, 2011.
  9. S. Sanka, C. Hota, and M. Rajarajan, "Secure data access in cloud computing," in 2010 IEEE 4th International Conference on Internet Multimedia Services Architecture and Application(IMSAA), pp. 1-6, 2010.
  10. R. Sravan Kumar and A. Saxena, "Data integrity proofs in cloud storage," in 2011 Third International Conference on Communication Systems and Networks (COMSNETS), 2011, pp. 1-4.
  11. A. Shraer, C. Cachin, A. Cidon, I. Keidar, Y. Michalevsky, and D. Shaket, "Venus: verification for untrusted cloud storage," in Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 2010, pp. 19-30.
  12. Z. Jianhong and C. Hua, "Security storage in the Cloud Computing: A RSA-based assumption data integrity check without original data," in 2010 International Conference on Educational and Information Technology (ICEIT), 2010, vol. 2, pp. 143 -147.
  13. I. Agudo, D. Nuñez, G. Giammatteo, P. Rizomiliotis, and C. Lambrinoudakis, "Cryptography Goes to the Cloud," in 1st International Workshop on Security and Trust for Applications in Virtualized Environments (STAVE 2011), 2011, vol. 187, p. 190-197.
  14. I. -hsun Chuang, S. -hao Li, K. -chieh Huang, Y. -hwang Kuo, "An Effective Privacy Protection Scheme for Cloud Computing" In 13th International Conference on Advanced Communication Technology (ICACT), 2011, pp. 260-265, Feb-2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Data Storage Correctness Privacy Security Trusted Third Party Auditor