Privacy Preserving and Load Balancing For Secure Cloud Storage

نویسندگان

  • S. Sasikala
  • T. Karthick
چکیده

Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes the data integrity protection in Cloud Computing a formidable task. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to the frequent change of the membership. In proposed a secure cloud storage for multi-owner data sharing authentication system supporting privacy-preserving by enabling public auditability for cloud storage with critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. And also by encryption and hashing techniques, such as Advanced Encryption Standard (AES), Merkle Hash Tree, any cloud user can anonymously share data with others. By using these techniques the storage overhead and computation cost is reduced. Also trustworthiness will be increased between the user and the Cloud Service Provider. Load Balancing is also implemented to process the User requested job by allocating to the sub servers which will process the task by evaluating the CPU performance level.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Secure and efficient privacy-preserving public auditing scheme for cloud storage

Recently, Worku et al. pointed out that the work “privacy-preserving public auditing for data storage security in cloud computing” proposed by Wang et al. is insecure and their second work “privacypreserving public auditing for secure cloud the storage” is inefficient. Thus, they offered a secure and efficient-privacy public auditing scheme for cloud storage. They claimed that their system is p...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Privacy-Preserving Public Verifying and Data Dynamics for Secure Cloud Storage Using TPV

Cloud computing is mainly used for storing client information in the server as the cloud storage without overhead of storage and maintenance, which is very helpful for clients because it is pay per use process. Here security is main problem for both client and server. In This paper we describe secure cloud storage with privacy preserving and data dynamics by using Third Party Verifier (TPV). Th...

متن کامل

Privacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code

Using cloud storage, users can remotely store their data, ondemand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for users with constrained computing resources. Users shou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014