Security Framework for Cloud Data Sharing

Authors

  • E. Dhivyaprabha  Assistant professor, Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India
  • R. Madhubala  Student, Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India
  • M. Meena Abarna  Student, Computer Science and Engineering, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India

Keywords:

Data security, Auditing, cloud storage, privacy preserving, encryption

Abstract

Cloud computing is a growing technology that offers storage as a service to user where data is maintained, managed, backed up remotely. Security of cloud-based applications and data is one of the key concerns of cloud customers. Some of the proposed cryptographic techniques provide data users with high security in terms of outsource storage; however many of the encryption algorithm are knackered, activating data security to be got through simply by compromising an algorithm. This scheme discovers a combination of encryption algorithms and distribution servers to improve database privacy. The main goal of this work is to develop a secure and efficient auditing scheme with the capabilities such as privacy preservation, confidentiality, and data integrity. So it satisfies all the requirements as well as it reduces cloud server burden.

References

  1. Ghassan O. Karame, Claudio Soriente,"Securing Cloud Data under Key Exposure", IEEE Transactions on Cloud Computing, 2017.
  2. Swapnali S. More and Sangita S. Chaudhari, "Secure and efficient public auditing scheme for cloud storage" ,2016.
  3. Ahmed Albugmi, Madini O. Alassafi, Robert Walters and Gary Wills ,"Data security in cloud computing" 2016.
  4. T. Subha, S.Rabin and S. Jayashri, "Efficient privacy preserving integrity checking model for cloud data storage security", 2016.
  5. P.Mell and T.Grance, "The NIST of Cloud Computing", NIST Special Publication 2011.
  6. C. Wang, Q. Wang, K. Ren, and W. Lou, " Ensuring Data Storage Security in Cloud Computing" IWQoS’09,Charleston, South Carolina, USA, 2009.
  7. Yuan Zhang, Lei Niu, Guomin Yang, Yong. Shamir Yu, Yi Mu, "On the security of auditing mechanisms for secure cloud storage",2014.
  8. Guomin Yang and Lai Yan-Ming, "Cryptanalysis of a simple key for access control based on polynomial" 2013.
  9. Li H, Dai Y, Tian L, Yang H, "Identity-based authentication for cloud computing,(LNCS)2009.
  10. Yuan Zhang, Chunxiang Xu, Jining Zhao, Xiaojun Zhang, Lei Niu, Guomin Yang, "Cryptanalysis of an Integrity checking scheme for cloud data sharing" , Journal of Information Security and applications 2015.
  11. N. Penchalaiah and R. Seshadri, "Effective Comparison and evaluation of DES and Rijndael Algorithm (AES)," International Journal of Computer Science and Engineering, 2010.
  12. Mahima Joshi and Yudhveer Singh Moudgil. "Secure Cloud Storage. International Journal of Computer Science & Communication Networks", Vol. 1 (2), pp. 171-175, 2011.
  13. S Dhanaya. "Privacy preserving third party auditing in cloud. Dissertation" report, 2015.
  14. W. Zeng, Y Zhao, K. Ou, and W. Song. "Research on Cloud Storage Architecture and Key Technologies", 2009.
  15. S. More and S. Chaudhari, "Third party public auditing scheme for cloud storage," Procedia Computer Science, 2016.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
E. Dhivyaprabha, R. Madhubala, M. Meena Abarna, " Security Framework for Cloud Data Sharing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.665-671, March-April-2018.