A Novel Approach for Data Storage Security in a Hosted Environment

نویسندگان

  • Srinivas Jagirdar
  • Ahmed Abdul Moiz Qyser
  • Dr.K.Uday Kumar
چکیده

The introduction of hosted environments to computing has brought a lot of change in the industry. With the advent of Infrastructure-as-a-Service, the concept of renting data stores is catching up. Security for the data in a hosted environment is an alarming issue. The paper focuses on cloud data storage security. We propose a security model to maintain the data store. This model ensures the safety of data in the hosted environment. By utilizing the homomorphic token with random masking the model achieves the abstraction of data stored on the Hosted Environment.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Detailed Modeling and Novel Scheduling of Plug-in Electric Vehicle Energy Storage Systems for Energy Management of Multi-microgrids Considering the Probability of Fault Occurrence

As an effective means of displacing fossil fuel consumption and reducing greenhouse gas emissions, plug-in electric vehicles (PEVs) and plug-in hybrid electric vehicles (PHEVs) have attracted more and more attentions. From the power grid perspective, PHEVs and PEVs equipped with batteries can also be used as energy storage facilities, due to the fact that, these vehicles are parked most of the ...

متن کامل

Tracing Adaptive Security Decisions

One of the challenges of any adaptive system is to ensure that users can understand how and why the behaviour of the system changes at runtime. This is particularly important for adaptive security behaviours which are essential for applications that are used in many different contexts, such as those hosted in the cloud. In this paper, we propose an approach for using traceability information, e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013