• Corpus ID: 795185

Enhanced Data Security in Cloud Computing with Third Party Auditor

  title={Enhanced Data Security in Cloud Computing with Third Party Auditor},
  author={Bhavna Makhija and Vinitkumar Gupta and Indrajit Rajput},
Cloud computing is environment which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is kind of centralized database where many organizations/clients store their data, retrieve data and possibly modify data. Cloud is a model where user is provided services by… 

Figures from this paper

Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing
The basics of cloud computing, general model and different approaches used for TPA are highlighted, which help the user to evaluate the risk of their services.
A Comparative Study : Various Approaches for Cloud Data Security
This paper will give the concise review of various approaches for cloud data security and their limitations.
A New Cryptography Techniques on Cloud Database with Independent and Concurrent Data Access
A SecureDBaaS is proposed as the first solution that allows cloud tenants to take full advantage of DBaaS qualities such as availability then reliability and elastic scalability without exposing unencrypted data to the cloud provider and the architecture design was motivated by the goal to allow multiple or independent and geographically distributed clients to execute concurrent operations on the encrypted data.
A Novel Technique to Improve Data Security in Cloud Architecture
The symmetric key agreement algorithm named Diffie Hellman is used, it is method of cryptographic key exchange which create session key between two parties who want to communicate with each other and HMAC for the data integrity, OTP(One Time Password) is created which provides more security.
Distributed , Concurrent , and Independent Access to Encrypted Cloud Databases B
SecureDBaaS is proposed as the first solution that allows cloud tenants to take full advantage of DBaaS qualities, such as availability, reliability, and elastic scalability, without exposing unencrypted data to the cloud provider.
Partitioning Data and Domain Integrity Checking for Storage-Improving Cloud Storage Security Using Data Partitioning Technique
This work aims to provide robust security with optimum space and integrity checking of data in cloud storage to ensure cloud storage security, integrity and error identification.
A Review of Data Security Issues in Cloud Environment
Security and privacy issues associated with cloud computing are analyzed and some reason for why all IT company are not used cloud is described and solution of some issues are given.
Different Data Security Issues of Cloud Computing: A Survey
The main purpose of this paper is to focus on the security issues of protecting user’s data in cloud.
Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
  • Samjot Kaur, V. Wasson
  • Computer Science
    2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies
  • 2015
The symmetric key agreement algorithm named Diffie Hellman is used, it is key exchange algorithm which creates session key between two parties who want to communicate with each other and HMAC for the data integrity and OTP (One Time Password) is created which provides more security.
RCT: A New Data Security Service for Cloud Computing Environment
A new data security algorithm is proposed to improve the data security in the cloud environment and it is shown that this algorithm should be able to handle peak loads and high availability of services at reasonable cost.


Robust Data Security for Cloud while using Third Party Auditor
A way to implement TPA who not only check the reliability of Cloud Service Provider (CSP) but also check the consistency and accountability of data is presented to address the challenging open issue of integrity and data dynamics.
Toward publicly auditable secure cloud data storage services
This article proposes that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established and describes approaches and system requirements that should be brought into consideration, and outlines challenges that need to be resolved.
Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
This paper utilize and uniquely combine the public key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system, which meets all above requirements.
Provable data possession at untrusted stores
The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs and the overhead at the server is low (or even constant), as opposed to linear in the size of the data.
Introduction to Cloud Computing
When plugging an electric appliance into an outlet, we care neither how electric power is generated nor how it gets to that outlet. This is possible because electricity is virtualized; that is, it is
Security requirements for cryptographic modules
A security model is described for different levels of cryptographic modules in different environments, designed after defining threats, and comprises of security levels, threat levels, cryptographically secure and approved algorithm requirements.
Cloud Computing Principles and Paradigms
This book is targeted for professional computer science developers and graduate students especially at Masters level and aims to identify potential research directions and technologies that will facilitate creation a global market-place of cloud computing services supporting scientific, industrial, business, and consumer applications.
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a
Security Requirements for Cryptographic Modules
This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic-based security systems are to be use to provide protection for sensitive or valuable data.
Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
To achieve efficient data dynamics, the existing proof of storage models are improved by manipulating the classic Merkle Hash Tree construction for block tag authentication, and an elegant verification scheme is constructed for the seamless integration of these two salient features in the protocol design.