Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

Securing Data in Cloud Storage with File Assured Deletion

Print
PDF
IJCA Proceedings on International Conference on Communication, Computing and Information Technology
© 2015 by IJCA Journal
ICCCMIT 2014 - Number 1
Year of Publication: 2015
Authors:
Anandavalli. M
L. Mary Immaculate Sheela

Anandavalli. M and L.mary Immaculate Sheela. Article: Securing Data in Cloud Storage with File Assured Deletion. IJCA Proceedings on International Conference on Communication, Computing and Information Technology ICCCMIT 2014(1):6-9, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Anandavalli. M and L.mary Immaculate Sheela},
	title = {Article: Securing Data in Cloud Storage with File Assured Deletion},
	journal = {IJCA Proceedings on International Conference on Communication, Computing and Information Technology},
	year = {2015},
	volume = {ICCCMIT 2014},
	number = {1},
	pages = {6-9},
	month = {March},
	note = {Full text available}
}

Abstract

Cloud Storage, Policy – based file assured deletion Cloud computing offers the hardware and software resources are made available on the internet. These services are provided and managed by the third party cloud providers at remote locations. Cloud storage providers are responsible for keeping data available and accessible which reduces the management overhead of the cloud. Cloud storage services are accessed through web content management or API. FADE (File Assured Deletion), a secure overlay cloud storage system constitutes policy-based access control and file assured deletion. It associates each file with access policies are unrecoverable by anyone. It protects the deleted data with policy-based file assured deletion. Our paper focuses on providing privacy and integrity of the outsourced data through FADE.

References

  • Y. Tang, P. P. C. Lee, J. C. S. Lui, and R. Perlman. 2010. FADE: Secure Overlay Cloud Storage with File Assured Deletion. In Proc. Of ICST SecureComm.
  • W. Stallings. 2006. Cryptography and Network Security. Prentice Hall.
  • R. Perlman. 2007 File System Design with Assured Delete. In ISOC NDSS.
  • S. Kamara and K. Lauter. 2000. Cryptographic Cloud Storage. In Proc. of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization.
  • Priyanka Nagtilak and Archana Lomte. 2013. Dynamic Access Control and File Assured Deletion For Secured Cloud Storage. International Journal of Research in Advent Technology, Vol. 1, No. 5, (Dec 2013), 214-215.
  • Priyanka Khandelwal. 2013. Analysis of Cloud access security on file system using secure policies. International Journal of Computer Science and Information Technology & Security. Vol. 3, No. 6, (Dec 2013), 406.
  • V. Goyal, O. Pandey, A. Sahai, and B. Waters. 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In Proc. Of ACM CCS.
  • Rutuja R. Sadul (et. al). , 2014. A Survey of Different Encryption Techniques for Secure Cloud Storage. Multidisciplinary Journal of Research in Engineering and Technology. Vol. 1, No. 1, (Apr 2014).
  • Pallavi D. Patil, Ranjana R. Badre. 2014. Access Control and File Deletion as a Service in Cloud Computing. International Journal in Computer Technology and Applications. Vol. 5, No. 3, (May 2014), 1059.
  • G. Gayatri, B. Sowmya. 2013. FADE: A Secure Overlay Cloud Storage System. International Journal of Science and Research. Vol. 2, No. 6, (Jun 2013), 150.