Cloud Data Security using Auditing Scheme

نویسندگان

  • Anuj Kumar Yadav
  • M. L. Garg
چکیده

Cloud computing has emerged as one of the latest computing paradigm and is a growing technology for upcoming years. According to NIST Cloud computing is a model for convenient, on-demand network access to a large pool of computing resources. Resource can be hardware or software resource and this pool of resources can be rapidly provisioned and released with minimum management effort or cloud service provider interaction [1]. In Cloud computing, different types of data and program can be stored at different locations, the cloud data centers and can be accessed whenever required, from anywhere, via different type of devices having internet connection. Due to this method of storing user’s data at cloud provider’s end, users gets numerous benefits such as, access flexibility, large storage capability, and resilience. In Cloud computing vendor supplies the hardware infrastructure, and the software interacts with the user through a front-end portal [2][3]. One of the service provided by the Cloud computing is Cloud storage, in which user information and data is stored, managed, backed up on multiple locations as a replica and made available to users via interconnection network. Apart from all benefits and advantages there are some concerns as well related to cloud computing, as in cloud computing data is put outside the control of the end user on a location that is unknown to the user. Due to this, Cloud computing also raises to various security issues. [4] End user is concerned about the integrity of data that is stored in cloud, as user’s data can be modified by attackers or even in some cases due to employee espionage. The cloud server is just used to save the encrypted blocks of data for the user. By using the auditing approach processing overhead of cloud server and verifying authority can be largely reduced. Cryptography is an effective technique that helps to assure user’s data accuracy. The Cryptographic techniques can be used in cloud to protect the data from attackers. In this paper, the significance of cryptography is discussed by which possibility of attacks on cloud data can be reduced. This paper covers some of the existing cryptographic methods that ensure the security of cloud data. In this paper auditing scheme is presented using cryptographic techniques and by using the auditing scheme based on the cryptography user data becomes more secure, that leads to enhancement of trust between the end user and cloud provider. Cloud data auditing is necessary for securing data in cloud storage since it facilitates cloud users to verify the integrity of their outsourced data effectively and efficiently.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of a Lightweight Cloud Data Auditing Scheme

In cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The autho...

متن کامل

Secure and efficient privacy-preserving public auditing scheme for cloud storage

Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...

متن کامل

On the Security of Three Public Auditing Schemes in Cloud Computing

Cloud computing provides a scalability environment for growing amounts of data and processes that work on various applications and services by means of on-demand self-services. It is necessary for cloud service provider to offer an efficient audit service to check the integrity and availability of the stored data in cloud. In this paper, we study three auditing schemes for stored data including...

متن کامل

Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing

Cloud Computing as the on-demand and remote provision of computational resources has been eagerly waited for a long time as a computing utility. It helps users to store their data in the cloud and enjoy the high quality service. However, users do not have physical possession on their own data, hence it is indispensable to create mechanisms on how to protect the security of the data stored. Thus...

متن کامل

Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy

In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, cloud server(CS) must prove to a verifier that he is actually storing all of the client's data unchanged. And, enabling public auditability for cloud storage is of critical importance to users with constrained com...

متن کامل

Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function

most common concerns for users in cloud storage are data integrity, confidentiality and availability, so various data integrity auditing schemes for cloud storage have been proposed in the past few years, some of which achieve privacy-preserving public auditing, data sharing and group dynamic, or support data dynamic. However, as far as we know, until now yet there doesn't exist a practical aud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016