CFP last date
20 May 2024
Reseach Article

Secure Approach for Data in Cloud Computing

by Bharti Dhote, A. M. Kanthe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 22
Year of Publication: 2013
Authors: Bharti Dhote, A. M. Kanthe
10.5120/10776-5188

Bharti Dhote, A. M. Kanthe . Secure Approach for Data in Cloud Computing. International Journal of Computer Applications. 64, 22 ( February 2013), 19-24. DOI=10.5120/10776-5188

@article{ 10.5120/10776-5188,
author = { Bharti Dhote, A. M. Kanthe },
title = { Secure Approach for Data in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 22 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number22/10776-5188/ },
doi = { 10.5120/10776-5188 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:18.817767+05:30
%A Bharti Dhote
%A A. M. Kanthe
%T Secure Approach for Data in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 22
%P 19-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Previously, computer software was not written with security in mind; but because of the increasing frequency and sophistication of malicious attacks against information systems, modern software design methodologies include security as a primary objective. With cloud computing systems seeking to meet multiple objectives, such as cost, performance, reliability, maintainability, and security, trade-offs have to be made. Any cloud server is vulnerable to an attacker with unlimited time and physical access to the server. Additionally, physical problems could cause the server to have down time. This would be a loss of availability, which is one of the key principles of the security triad — confidentiality, integrity, and availability (CIA). Availability addresses the issues that include attempts by malicious entities to control, destroy, or damage computing resources and deny legitimate access to systems. While availability is being preserved, confidentiality and integrity have to be maintained. In this paper, we propose an effective and flexible scheme opposing to its predecessor. By utilizing the homomorphic token and cryptographic encryption method achieves the integration of storage correctness insurance and error localization i. e. the misbehaving of servers. The new scheme further supports to dynamic operations on data blocks like delete, update, insert, append etc.

References
  1. I-Hsun Chuang, Syuan-Hao Li, Kuan-Chieh Huang, Yau-Hwang Kuo, "An Effective Privacy Protection Scheme for Cloud Computing", ICACT-2011, Pages 260-265
  2. Cong Wang, Qian Wang, Kui Ren, Wenjing Lou "Ensuring Data Storage Security in Cloud Computing," Proc. IWQoS '09, July 2009, Pages 1–9.
  3. Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. ESORICS '09, Sept. 2009, Pages 355–70.
  4. Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou, "Privacy-Preserving Public Auditing for Storage Security in Cloud Computing," Proc. IEEE INFOCOM '10, Mar. 2010.
  5. Kevin D. Bowers, Ari Juels, Alina Oprea, " HAIL: A High-Availability and Integrity Layer for Cloud Storage", Proceeding CCS '09 Proceedings of the 16th ACM conference on Computer and communications security Pages 187-198
  6. Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram Swaminathan. , "Auditing to keep Online Storage Services Honest," Proc. USENIX HotOS '07, May 2007.
  7. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. , "Scalable and Efficient Provable Data Possession," Proc. SecureComm '08, Sept. 2008.
  8. Ayad F. Barsoum and M. Anwar Hasan, "On Data Replication and Storage Security over Cloud Computing: Are we getting what we are paying for?" in digital library citeseerx. ist. psu. edu/viewdoc/ pg. 1-36
  9. Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing" Data Security Model for Cloud Computing" Proceedings of the 2009 International Workshop on Information Security and Application (IWISA 2009) pg. 141-144
  10. Uma Somani,Kanika Lakhani,Manish Mundra, "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing" , 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) Pages 211-216
  11. A. Juels and J. Burton S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. of CCS '07, pp. 584–597, 2007.
  12. K. D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," Cryptology ePrint Archive, Report 2008/175, 2008, http://eprint. iacr. org/
Index Terms

Computer Science
Information Sciences

Keywords

Availability Cloud Computing Data Security