89,872 Hits in 2.8 sec

Integrating Security Services in Cloud Service Stores [chapter]

Joshua Daniel, Fadi El-Moussa, Géry Ducatel, Pramod Pawar, Ali Sajjad, Robert Rowlingson, Theo Dimitrakos
2015 IFIP Advances in Information and Communication Technology  
The result of this integration is then offered as a re-usable service across multiple Cloud platforms through a Cloud service store.  ...  In this paper we describe a novel Cloud-based security management solution that empowers Cloud consumers to protect their systems, applications and data in the Cloud, whilst also improving the control  ...  Controls to enforce the integrity and security functions can also be integrated in a Cloud Application and Service store as "horizontal" common capabilities at the Cloud service management automation layer  ... 
doi:10.1007/978-3-319-18491-3_19 fatcat:5upp7lt5pjbgxes5ya5hf5esjm

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

Alexandre Pinheiro, Edna Dias Canedo, Rafael de Sousa Junior, Robson de Oliveira Albuquerque, Luis García Villalba, Tai-Hoon Kim
2018 Sensors  
With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior.  ...  However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider  ...  Integrity Verification and Privacy Guarantee In their effort to guarantee the integrity of data stored in cloud services, many research works present proposals in the domain analyzed in this paper.  ... 
doi:10.3390/s18030753 pmid:29498641 pmcid:PMC5876826 fatcat:72v24pz7wvb4hcl5h2tkdqbsdy

Preserving Data Confidentiality Using Multi-cloud Architecture

M. Sulochana, Ojaswani Dubey
2015 Procedia Computer Science  
One central concern in cloud computing is privacy and integrity of data processes in cloud.  ...  The security of cloud computing has always been an important aspect of the quality of service from cloud service providers.  ...  To solve the data security problems in public environment, we propose an effective model for security and integrity of data stored using multi cloud strategy.  ... 
doi:10.1016/j.procs.2015.04.035 fatcat:6zozj3xsivao7hjvb7jobsfpvi


N.Vidhya .
2014 International Journal of Research in Engineering and Technology  
Data integrity and storage efficiency are the two important requirements for cloud storage. Authorized users access the data and share the files in secure manner.  ...  The cloud storage service (CSS) relieves the burden for storage management and maintenance. Fragment Structure, random sampling and index table is used to construct the Audit service.  ...  Cloud service provider offered an audit service to audit the integrity and availability of Secure Storage Pool.  ... 
doi:10.15623/ijret.2014.0305061 fatcat:4ufwsbl66zanlonrnpkt555ly4

Privacy Preservation using Shamir's Secrete Sharing Algorithm for Data Storage Security

Tejashree Paigude, Prof. T. A. Chavan
2014 International Journal of Computer Trends and Technology  
Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security.  ...  In this paper, we proposed a Shamir's Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing.  ...  Security in cloud computing can be addressed in many ways as authentication, integrity, confidentiality. Data integrity or data correctness is another security issue that needs to be considered.  ... 
doi:10.14445/22312803/ijctt-v8p118 fatcat:x25pw5oebfbwzmbnp5netdboyy

Comparative Study of Security Mechanisms in Multi-cloud Environment

Monali Shrawankar, Ashish Kr. Shrivastava
2013 International Journal of Computer Applications  
Double-checking the security of cloud computing is a foremost factor in the cloud computing natural environment, as users often store sensitive data with cloud storage providers but these providers may  ...  Thus it could assist in analyzing best fit scenario for elegant secured cloud computing environment.  ...  Service Availability Another foremost anxiety in cloud services is service accessibility. Service accessibility is most important in the cloud computing security.  ... 
doi:10.5120/13396-1039 fatcat:j2s46uschva3jpue4hqkfd3hfq

Data Security Challenges and Its Solutions in Cloud Computing

R. Velumadhava Rao, K. Selvamani
2015 Procedia Computer Science  
Cloud data are stored and accessed in a remote server with the help of services provided by cloud service providers.  ...  In this paper, we highlight data related security challenges in cloud based environment and solutions to overcome.  ...  The data stored in remote data center can be accessed or managed through the cloud services provided by the cloud service providers.  ... 
doi:10.1016/j.procs.2015.04.171 fatcat:eef3xevaq5ggnnntycmczq2n7q

Research of Data Security Model in Cloud Computing Platform for SMEs

Tao Sun, Xinjun Wang
2013 International Journal of Security and Its Applications  
For this reason this paper proposed a model to solve the problem of data security in cloud computing. The model adopts efficient encryption mechanisms to protect users' data.  ...  In recent years, cloud computing has become a major mode to address SMEs inefficient and help improve their competitiveness.  ...  In cloud computing environment, users need to check the integrity about the returned data that stored in cloud server.  ... 
doi:10.14257/ijsia.2013.7.6.10 fatcat:a6aphtcnzvbdjod7v2s55zed4i

Cloud Data Security Using Third Party Auditing and Encryption
IJARCCE - Computer and Communication Engineering

Alpesh D. Patil, Abhijit T. Sapkale, Bhushan D. Shimpi, Archana K. Bhavsar
2015 IJARCCE  
Security for the data which is stored on the cloud by user is very important issue.  ...  User may expect some security for their data from the cloud service provider, there can be serious issues regarding data security between user and service provider.  ...  Data Storage Service System In this module, we considered FOUR entities to store the data in secure manner:  Data owner (DO) Data owner has ample of data to be stored on the cloud and can access it when  ... 
doi:10.17148/ijarcce.2015.4327 fatcat:7k465ldgrzd2dhdjlas5tmbzd4

DIaaS: Data Integrity as a Service in the Cloud

Surya Nepal, Shiping Chen, Jinhui Yao, Danan Thilakanathan
2011 2011 IEEE 4th International Conference on Cloud Computing  
the security risk of the data stored in the storage services by checking the data integrity with the help of IMS.  ...  Keywords-cloud storage; data integrity; security; data integrity as a service. I.  ...  stored data in the cloud, but the client does not trust the data integrity management service.  ... 
doi:10.1109/cloud.2011.35 dblp:conf/IEEEcloud/NepalCYT11 fatcat:fgc36mfskfbaxct7i5y3bpellq

Issues Related to Data Security and Privacy in Cloud Computing

Ashish A. Patokar
2018 International Journal for Research in Applied Science and Engineering Technology  
Huge data are store on the cloud and the authorized users can access this data with support of various service providers.  ...  This paper focus on the data security and privacy issues such as data integrity, data privacy, data availability, data location access control in the cloud computing and the solution to the data security  ...  Mervat Bamiah discussed the cloud security challenges and the clouds adopt services in industries [10] . S.  ... 
doi:10.22214/ijraset.2018.1289 fatcat:k5dgwnpjbbewzi4csgbma75hma

A Review of Cloud Computing Security Issues

Manpreet kaur, Hardeep Singh
2015 International Journal of Education and Management Engineering  
Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments.  ...  In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet.  ...  to customers in terms of confidentiality, integrity, and other security services.  ... 
doi:10.5815/ijeme.2015.05.04 fatcat:jdoe544r5nh6vebbw6suuyppgq

A Review of Cloud Computing Security Issues

Manpreet Kaur, Hardeep Singh
2015 International Journal of Grid and Distributed Computing  
Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments.  ...  In today's era, it is most interesting and enticing technology which is offering the services to its users on demand over the internet.  ...  to customers in terms of confidentiality, integrity, and other security services.  ... 
doi:10.14257/ijgdc.2015.8.5.21 fatcat:3gcn6ysygfa2fjv6s2czcun5hu

Enhancing Data Integrity Proofs with Cloud Storage Security

2017 International Journal of Science and Research (IJSR)  
The prime objective is to give effective and efficient method for cloud storage security in cloud computing. We are analyzed types of cloud storage and security aspects in cloud.  ...  Data security is considered as the constant issue leading towards a hitch in the adoption of cloud computing.  ...  We identified the key challenges and research dimensions that need to be addressed in the data integrity in cloud storage security.  ... 
doi:10.21275/art20164007 fatcat:qkk3l2boujdz3pbe7uk2nehec4

An Efficient RSA Based Data Integrity Schema in Secured Cloud Storage

S. Hemalatha, R. Manickachezian
2014 Research Journal of Applied Sciences Engineering and Technology  
Cloud computing is the next stage in evolution of the internet, which provides large amount of computing and storage to customers provisioned as a service over the internet.  ...  In order to make easier rapid deployment and to provide security, publicly auditable cloud data storage is established to reduce energy and save money.  ...  In this paper we focus on providing dynamic integrity of the data stored as well as the security problems faced in cloud [7] [8] [9] [10] [11] .  ... 
doi:10.19026/rjaset.8.1204 fatcat:u45klkyij5anrcykf5pys3xgya
« Previous Showing results 1 — 15 out of 89,872 results