3,580 Hits in 4.2 sec

Secure Audit Service by using TPA

Pradnya P.
2016 International Journal of Computer Applications  
Using Cloud Storage, users can remotely store their data and enjoy high quality applications and services from a shared pool of resources.  ...  Also, the auditing process should not bring in further more burdens to the user, a secure cloud storage for which integrate the technique of Homomorphic linear authenticator with random masking.  ...  [15] , [10] propose introducing a TPA to keep online storage honest by first encrypting the data then sending a number of precomputed symmetric-keyed hashes over the encrypted data to the auditor.  ... 
doi:10.5120/ijca2016909136 fatcat:3rtg2lrp2bhmneu33yhulh7oyi

Enhancing security for storage services in cloud computing

S. Suganya, P. Damodharan
2013 2013 International Conference on Current Trends in Engineering and Technology (ICCTET)  
To address this new problem and improved security and reliable cloud storage service to realize, we propose a distributed storage integrity auditing mechanism, by utilizing the homomorphic token and distributed  ...  Storage Services in cloud computing allows users to store away for the high quality cloud applications on-demand to enjoy without the hassle of managing their own hardware and software their data.  ...  Shah et al suggested that keep online storage honest first encrypting the data, send a set of pre-computed hash TPA symmetric key encrypted data to the auditor.  ... 
doi:10.1109/icctet.2013.6675995 fatcat:yixh6xezkvapnbqhbzuvy75qcy

Materialize Secluded Data Integrity Checking Protocol For Secured Storage Services With Data Dynamics And Public Verifiability In Hybrid Cloud

Ms. Vaishali Dubey, Department Of Computer Science & Engineering Dayananda Sagar College Of Engineering, Bangalore, India, Dr. A. Gururani, Department Of Computer Science & Engineering Dayananda Sagar College Of Engineering, Bangalore, India
2019 The American Journal of Engineering And Techonology  
This style permits users to audit the cloud storage with terribly light-weight communication and computation value. additionally, the auditing result not solely ensures robust cloud storage correctness  ...  s protocol is customized to support public verifiability and data Dynamics while not the assistance of a 3rd party auditor.  ...  keep within the cloud; the cloud server (CS), that is managed by cloud service supplier (CSP) to produce data storage service; the third party auditor (TPA), UN agency has experience and capabilities  ... 
doi:10.37547/tajet/volume01issue03-01 fatcat:mdw3q2juxrc7zmigevnbzmkq4a

Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing
IJIREEICE - Electrical, Electronics, Instrumentation and Control

Cloud computing enables vastly scalable services consumed over the Internet.Cloud storage is a model of data storage where the digital data is stored in logical pools.These cloud storage providers are  ...  responsible for keeping the data available and accessible.but the security of cloud storage is always the focus of several potential cloud clients,and huge impact for its widespread application.  ...  [10] propose a scheme which allowing a trust public auditor (TPA) to keep online storage honest by first encrypting the data then sending a number of precomputed symmetric-keyed hashes over the encrypted  ... 
doi:10.17148/ijireeice.2014.21111 fatcat:735k3g5cavcmjhou7zsekffy64

Implementing Remote Data Integrity Checking Protocol for Secured Storage Services with Data Dynamics and Public Verifiability In Cloud Computing

Ms. Vaishnavi Moorthy
2012 IOSR Journal of Engineering  
This design allows users to audit the cloud storage with very lightweight communication and computation cost.  ...  In addition, the auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server  ...  [8] , [9] propose allowing a TPA to keep online storage honest by first encrypting the data then sending a number of pre-computed symmetric-keyed hashes over the encrypted data to the auditor.  ... 
doi:10.9790/3021-0203496500 fatcat:2uo277xsfrcoto5fgxkrrmukvm

Toward publicly auditable secure cloud data storage services

Cong Wang, Kui Ren, Wenjing Lou, Jin Li
2010 IEEE Network  
We describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become  ...  In this article we propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established.  ...  The TPA should be able to efficiently audit the cloud data storage without local copy of data and without any additional online burden for data owners.  ... 
doi:10.1109/mnet.2010.5510914 fatcat:yn3jmz7qxjf5nbnc54ux6yoo3q

Review of Data Integrity Checking in Cloud Computing

Hanumantha Rao. Galli, Padmanabham. P
2017 International Journal of Innovative Research in Computer Science & Technology  
Here the major role is that storing of user data and data has to provide to the users whenever they needed.  ...  There are many challenges will takes place to perform store and providing of information to the user. One of the challenges in cloud computing is the integrity of the data stored in cloud.  ...  [3] propose allowing a TPA to keep online storage honest by first encrypting the data then sending a number of pre-computed symmetric-keyed hashes over the encrypted data to the auditor.  ... 
doi:10.21276/ijircst.2017.5.3.3 fatcat:57jr4qcysbggvlulnbutztwgsq

Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

Tengfei Tu, Lu Rao, Hua Zhang, Qiaoyan Wen, Jia Xiao
2017 Security and Communication Networks  
As information technology develops, cloud storage has been widely accepted for keeping volumes of data.  ...  Remote data auditing scheme enables cloud user to confirm the integrity of her outsourced file via the auditing against cloud storage, without downloading the file from cloud.  ...  Acknowledgments The authors would like to thank NSFC (Grant no. 61502044).  ... 
doi:10.1155/2017/4603237 fatcat:6jds3tvwcjatxmhl2xj5meqhjm

Review Paper On An Efficient Encryption Scheme In Cloud Computing Using ABE

Rutuja G. Kaple, Prof. S. B. Rathod
2018 International Journal of Trend in Scientific Research and Development  
To sol of issues, we can use third party as an auditor. Here we have analyzed different ways to ensure secure data storage in cloud.  ...  For auditing we are introducing Third Party Auditor. Here the data will be encrypted at user side and will be in encrypted form over network and to TPA.  ...  Shah et al. propose allowing a TPA to keep online storage honest by first encrypting the data then sending a number of pre-computed symmetric-keyed hashes over the encrypted data to the auditor.  ... 
doi:10.31142/ijtsrd10915 fatcat:inuiazhodffhrfwiibltqwevd4

Proofs of Data Residency

Hung Dang, Erick Purwanto, Ee-Chien Chang
2017 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17  
While cloud storage services offer manifold benefits such as cost-effectiveness or elasticity, there also exist various security and privacy concerns.  ...  PoDR can be employed to check whether the data are replicated across different storage servers, or combined with storage server geolocation to "locate" the data in the cloud.  ...  We call the probability that the honest prover, who keeps entire F in its local drives, fails the audit the false rejection rate (denoted by γ).  ... 
doi:10.1145/3052973.3053016 dblp:conf/ccs/DangPC17 fatcat:mvulko3dpzaa5hmu64vox6s4ya

Data storage auditing service in cloud computing: challenges, methods and opportunities

Kan Yang, Xiaohua Jia
2011 World wide web (Bussum)  
Therefore, an independent auditing service is required to make sure that the data is correctly hosted in the Cloud.  ...  First, we give a set of requirements of the auditing protocol for data storage in cloud computing.  ...  In fact, it is not fair to let any side of the cloud service providers or the data owners conduct the auditing, because neither of them could be guaranteed to provide unbiased and honest auditing result  ... 
doi:10.1007/s11280-011-0138-0 fatcat:qfhj53zbnfgl7cdj3sw7sfvuea

Improving efficiency of remote data audit for cloud storage

2019 KSII Transactions on Internet and Information Systems  
The cloud storage service becomes a rising trend based on the cloud computing, which promotes the remote data integrity auditing a hot topic.  ...  A new scheme named improving audit efficiency of remote data for cloud storage is designed.  ...  and communication capability, is trusted by users can interact with CSP to audit user data [30] ; the public which are using storage services or want to use storage services provided by the CSP.  ... 
doi:10.3837/tiis.2019.04.026 fatcat:jcyiuthdcraulb4pisurzegsnq

A Study of Data Storage Security Issues in Cloud Computing

M. B. Jayalekshmi, S. H. Krishnaveni
2015 Indian Journal of Science and Technology  
This paper gives an overview of the security issues on data storage along with its possible solutions. It also gives a brief description about the encryption techniques and auditing mechanisms.  ...  Despite these advantages, there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing.  ...  DES was replaced by AES encryption which is fast and flexible and was used to protect information in smart cards and online transactions.  ... 
doi:10.17485/ijst/2015/v8i1/84229 fatcat:grrb4pctmrbf5nuuixxajqep7a

Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks

Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang
2015 International Journal of Distributed Sensor Networks  
To tackle with these security challenges, many classic auditing schemes of cloud storage have been proposed.  ...  As we know, cloud data storage and retrieval have become popular for efficient data management in distributed sensor networks; thus they can enjoy the on-demand high-quality cloud storage service.  ...  However, during providing the cloud data storage based services, for the benefits the cloud server might neglect to keep or deliberately delete rarely accessed data files which belong to the DSN data manager  ... 
doi:10.1155/2015/593759 fatcat:a6jkhdarw5bcziw2ljhzs4g4ru

Enabling Cloud Storage Auditing with Key Exposure Resistance

V. Goutham, B. Mounika, P. Shiva
2016 International Journal of Computer Applications  
Cloud storage auditing is viewed as an imperative service to corroborate the veracity of the data in public cloud.  ...  It is investigated on how to reduce the damage of the client's key revelation in cloud storage auditing, and provide the first handy elucidation for this new problem setting.  ...  Shah et al. introduced a TPA to keep online storage honest. The protocol requires the auditor to maintain the state, and suffers from bounded usage. Wang et al.  ... 
doi:10.5120/ijca2016910794 fatcat:vpvk7kuehvavrgigozwovbqkbi
« Previous Showing results 1 — 15 out of 3,580 results