CFP last date
20 May 2024
Reseach Article

Designing Efficient Security Technique for Data Storage in Cloud Computing

Published on June 2015 by Ingale Pragati Purushottam, V. M. Thakare
National Conference on Recent Trends in Computer Science and Engineering
Foundation of Computer Science USA
MEDHA2015 - Number 4
June 2015
Authors: Ingale Pragati Purushottam, V. M. Thakare
ae37d55f-851b-435e-9e8c-98bfc2dc77de

Ingale Pragati Purushottam, V. M. Thakare . Designing Efficient Security Technique for Data Storage in Cloud Computing. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 4 (June 2015), 1-4.

@article{
author = { Ingale Pragati Purushottam, V. M. Thakare },
title = { Designing Efficient Security Technique for Data Storage in Cloud Computing },
journal = { National Conference on Recent Trends in Computer Science and Engineering },
issue_date = { June 2015 },
volume = { MEDHA2015 },
number = { 4 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/medha2015/number4/21445-8048/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Science and Engineering
%A Ingale Pragati Purushottam
%A V. M. Thakare
%T Designing Efficient Security Technique for Data Storage in Cloud Computing
%J National Conference on Recent Trends in Computer Science and Engineering
%@ 0975-8887
%V MEDHA2015
%N 4
%P 1-4
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing is an environment in which data owner move data from local system to cloud storage, next job of cloud service provider (CSP) to store that data and provide it to the user on their demand. In this simplest environment exist various security risk on cloud storage because it consist sensitive data of owner, sometime it may happened cloud services provide is dishonest. On the brief view it is clear there is various risk on cloud data storage. In this paper firstly introduce recycle storage method for reliability of data and for improving the performance and security concern proposed audit storage system.

References
  1. E-C. Chang and J. Xu, "Remote integrity check with dishonest storage server, " Proc, 13th European symp. Research in computer security (ESORICS' 08) pp. 223 -July,2008
  2. Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance," Proc. IEEE INFOCOM, pp. 954-962, Apr. 2009.
  3. J. Li, M. N. Krohn, D. Mazie`res, and D. Shasha, "Secure Untrusted Data Repository (SUNDR)," Proc. Sixth Conf. Symp. OperatingSystems Design Implementation, pp. 121-136, 2004.
  4. Kan Yang and Xiaohua Jia, Fellow- "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing". IEEE Transaction On Parallel and distributed system Vol: 24 no 09, pp 1717-1726, Supt 2013.
  5. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Transaction On Parallel And Distributed System Vol: 22, NO. 5, pp 847-859 MAY 2011.
  6. Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu "Dynamic Audit Services for Outsourced Storages in Clouds", IEEE Transaction On Services Computing, Vol: 6, NO. 2, pp 227-238APRIL-JUNE 2013.
  7. Ayad Barsoum and Anwar Hasan, "Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems", IEEE Transaction On Parallel And Distributed System, Vol: 24, NO. 12, pp 2375-2385, DECEMBER 2013.
  8. Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, "Toward Secure and Dependable Storage Services in Cloud Computing", IEEE Transaction On Services Computing, Vol: 5, NO. 2, pp 220-232, APRIL-JUNE 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Risk Recycle Storage Audit Storage.