• Corpus ID: 15606889

An Effective Data Storage Security Scheme forCloud Computing

@article{Batra2013AnED,
  title={An Effective Data Storage Security Scheme forCloud Computing},
  author={Kalpana Batra and C. Sunitha and Sushil Kumar},
  journal={International Journal of Innovative Research in Computer and Communication Engineering},
  year={2013},
  volume={1},
  pages={808-813}
}
Cloud computing has been envisioned as the next generation information technology architecture for enterprises. Cloud Computing moves the data on the cloud storage servers maintained by service providers, which deprive the user of their control of the physical possession of data, even though they are the owners of the data. This unique feature however has raised many new security challenges which have not been well understood. In this paper we focus on cloud data storage security, which is an… 

Figures and Tables from this paper

Data Storage Security in Cloud Computing: A survey
TLDR
The survey on different issues related to data storage security on single cloud as well as multi cloud and fault tolerance is represented to represent the trust required on cloud storage is so far had been limited by users.
Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey
TLDR
This paper describes the different techniques along with few security challenges, advantages and also disadvantages of cloud computing and provides the analysis of data security issues and privacy protection affairs related to cloud computing.
Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey
TLDR
This paper describes the different techniques along with few security challenges, advantages and also disadvantages of cloud computing and provides the analysis of data security issues and privacy protection affairs related to cloud computing.
Secure Cloud Storage Based on Partitioning and Cryptography
TLDR
This paper is focusing the integrity of the data using a technique that divides the data into number of pieces and encrypting it by newly introduced method, which ensures more security and integrity.
Cloud Computing Overview, Security Threats and Solutions-A Survey
TLDR
To verify the correctness, integrity, confidentially and availability of data in the cloud, this paper focuses on various cloud computing security threats and solution that have been used since security is an important measure for quality of service.
Signature Verification and Bloom Hashing Technique for Efficient Cloud Data Storage
TLDR
The experimental results observe that the BH-SS technique is able to enhance the cloud data integrity and also reduces the execution time of cloud storage and space complexity when compared to state-of-the-art-works.
International Journal of Advanced Research in Computer Science and Software Engineering Cloud Security Using Encryption Techniques
TLDR
Different security issues to cloud and different cryptographic algorithms adoptable to better security for the cloud are surveyed.
Survey Paper on Critical Section & Privacy Issue In Cloud Computing
TLDR
A comparative research analysis of the existing research work with reference to the data security and privacy protection techniques used in the cloud computing environment is made.
Secured Key Menagement in Manufacturing Execution Systems of Cloud Connect
TLDR
This research effort focuses more on aggregation of these keys into a single aggregate key which will in turn reduce the burden on the network overhead.
...
...

References

SHOWING 1-10 OF 12 REFERENCES
Ensuring Data Storage Security in Cloud Computing
TLDR
A new data encoding scheme called layered interleaving is proposed, designed for time-sensitive packet recovery in the presence of bursty loss, which is highly efficient in recovering the singleton losses almost immediately and from bursty data losses.
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
TLDR
The task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud is considered, and an elegant verification scheme is constructed for seamless integration of these two salient features in the protocol design.
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
TLDR
This paper uniquely defines the fundamental properties of threshold-multisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
TLDR
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements.
On Data Replication and Storage Security over Cloud Computing : Are we getting what we are paying for ?
TLDR
This paper proposes Efficient Multi-Copy Provable Data Possession (EMC-PDP) protocols and proves the security of the protocols against colluding servers, as well as demonstrating the efficiency and efficiency of these protocols.
Scalable and efficient provable data possession
TLDR
This paper constructs a highly efficient and provably secure PDP technique based entirely on symmetric key cryptography, while not requiring any bulk encryption, and allows outsourcing of dynamic data, i.e, it efficiently supports operations, such as block modification, deletion and append.
An effective privacy protection scheme for cloud computing
TLDR
The Effective Privacy Protection Scheme (EPPS) is proposed to provide the appropriate privacy protection which is satisfying the user-demand privacy requirement and maintaining system performance simultaneously.
Data Security Model for Cloud Computing
TLDR
This paper analyses the basic problem of cloud computing data security, the analysis of HDFS architecture, and sets up a mathematical data model for cloud computing, to build a data security model forcloud computing.
HAIL: a high-availability and integrity layer for cloud storage
TLDR
A strong, formal adversarial model for HAIL is proposed, and rigorous analysis and parameter choices are proposed that improve on the security and efficiency of existing tools, like Proofs of Retrievability deployed on individual servers.
Auditing to Keep Online Storage Services Honest
TLDR
It is argued that third-party auditing is important in creating an online service-oriented economy, because it allows customers to evaluate risks, and it increases the efficiency of insurance-based risk mitigation.
...
...