Corpus ID: 63817377

Data Partitioning Technique to Improve Cloud Data Storage Security.

  title={Data Partitioning Technique to Improve Cloud Data Storage Security.},
  author={Swapnil V. Khedkar and A. D. Gawande},
Cloud storage enables users to remotely store and retrieve their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Cloud storage system enables storing of data in the cloud server efficiently and makes the user to work with the data without any trouble of the resources. Cloud computing is highly promising technology because of its unlimited resource provisioning and data storage services which help us in managing the data… Expand
Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing
The review of key generation and crypto analysis of data over cloud computing is presented, which gives the concept of cloud based data auditing in block level. Expand
Enforcing database security on cloud using a trusted third party based model
In this research, a model that uses a trusted third party (TPP) to enforce the database security in the cloud is proposed and describes how a client processes a query securely by using encryption mechanisms and partitioning methods. Expand
A secure transaction of cloud data using conditional source trust attributes encryption mechanism
Experimental analysis shows that the CSTAE-PSTO framework is able to improve the security rate on data layer and reduce the transaction completion time when compared to the state-of-the-art works. Expand
File Distribution Preparation with File Retrieval and Error Recovery in Cloud Environment
The data stored on server is more secure on cloud platform and if any misbehavior of server is occurred or any file fragment is corrupted can be detected with automated tools and it can be also traced that on which server the file fragments is corrupted. Expand
Scalable Access Policy for Attribute Based Encryption in Cloud Storage
This work proposes a form of access policy named block Linear Secret Sharing Scheme (LSSS) matrix, bringing a number of improvements in various aspects of ABE, including advantages of efficiency, flexibility and security. Expand
Ensures Dynamic access and Secure E-Governance system in Clouds Services - EDSE
In nature the data are dynamic in cloud service; hence this process aims to process the operation with reduced computational rate, space and time consumption and also ensure trust based secured access control. Expand
Balancing theft and corruption threats by data partition in cloud system with independent server protection
This work makes original contributions by formulating and solving constrained optimization problems to balance the data theft and data corruption probabilities in cloud computing systems subject to co-resident attacks. Expand
An Improved Automated Multi Level Intrusion Detection and Log Management System In Cloud Computing.
Information and Communications Technology (ICT)] has come to stay. As a result, most of our institutions have decided to move their important files to the cloud and do online transactions –allocationExpand
Cloud Computing Overview, Security Threats and Solutions-A Survey
To verify the correctness, integrity, confidentially and availability of data in the cloud, this paper focuses on various cloud computing security threats and solution that have been used since security is an important measure for quality of service. Expand
Future Directions to the Application of Distributed Fog Computing in Smart Grid Systems
In this chapter, a prospective research roadmap, future challenges, and opportunities to apply fog computing on smart grid systems is presented. Expand


PDDS - Improving cloud data storage security using data partitioning technique
The partitions method is proposed for the data storage which avoids the local copy at the user side by using partitioning method, which ensures high cloud storage integrity, enhanced error localization and easy identification of misbehaving server. Expand
Toward Secure and Dependable Storage Services in Cloud Computing
This paper proposes a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data, which is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. Expand
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements. Expand
Ensuring Data Storage Security in Cloud Computing
A new data encoding scheme called layered interleaving is proposed, designed for time-sensitive packet recovery in the presence of bursty loss, which is highly efficient in recovering the singleton losses almost immediately and from bursty data losses. Expand
Cloud Computing is a model for enabling convenient on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal managementExpand
Privacy-Preserving Public Auditing for Secure Cloud Storage
A secure cloud storage system supporting privacy-preserving public auditing and the result is extended to enable the TPA to perform audits for multiple users simultaneously and efficiently. Expand
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
This work proposes a threshold proxy re-encryption scheme and integrates it with a decentralized erasure code such that a secure distributed storage system is formulated and fully integrates encrypting, encoding, and forwarding. Expand
A secure erasure code-based cloud storage system with secure data forwarding
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern overExpand
Toward publicly auditable secure cloud data storage services
This article proposes that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established and describes approaches and system requirements that should be brought into consideration, and outlines challenges that need to be resolved. Expand
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design. Expand