Security Framework for Cloud Data Sharing
Keywords:
Data security, Auditing, cloud storage, privacy preserving, encryptionAbstract
Cloud computing is a growing technology that offers storage as a service to user where data is maintained, managed, backed up remotely. Security of cloud-based applications and data is one of the key concerns of cloud customers. Some of the proposed cryptographic techniques provide data users with high security in terms of outsource storage; however many of the encryption algorithm are knackered, activating data security to be got through simply by compromising an algorithm. This scheme discovers a combination of encryption algorithms and distribution servers to improve database privacy. The main goal of this work is to develop a secure and efficient auditing scheme with the capabilities such as privacy preservation, confidentiality, and data integrity. So it satisfies all the requirements as well as it reduces cloud server burden.
References
- Ghassan O. Karame, Claudio Soriente,"Securing Cloud Data under Key Exposure", IEEE Transactions on Cloud Computing, 2017.
- Swapnali S. More and Sangita S. Chaudhari, "Secure and efficient public auditing scheme for cloud storage" ,2016.
- Ahmed Albugmi, Madini O. Alassafi, Robert Walters and Gary Wills ,"Data security in cloud computing" 2016.
- T. Subha, S.Rabin and S. Jayashri, "Efficient privacy preserving integrity checking model for cloud data storage security", 2016.
- P.Mell and T.Grance, "The NIST of Cloud Computing", NIST Special Publication 2011.
- C. Wang, Q. Wang, K. Ren, and W. Lou, " Ensuring Data Storage Security in Cloud Computing" IWQoS’09,Charleston, South Carolina, USA, 2009.
- Yuan Zhang, Lei Niu, Guomin Yang, Yong. Shamir Yu, Yi Mu, "On the security of auditing mechanisms for secure cloud storage",2014.
- Guomin Yang and Lai Yan-Ming, "Cryptanalysis of a simple key for access control based on polynomial" 2013.
- Li H, Dai Y, Tian L, Yang H, "Identity-based authentication for cloud computing,(LNCS)2009.
- Yuan Zhang, Chunxiang Xu, Jining Zhao, Xiaojun Zhang, Lei Niu, Guomin Yang, "Cryptanalysis of an Integrity checking scheme for cloud data sharing" , Journal of Information Security and applications 2015.
- N. Penchalaiah and R. Seshadri, "Effective Comparison and evaluation of DES and Rijndael Algorithm (AES)," International Journal of Computer Science and Engineering, 2010.
- Mahima Joshi and Yudhveer Singh Moudgil. "Secure Cloud Storage. International Journal of Computer Science & Communication Networks", Vol. 1 (2), pp. 171-175, 2011.
- S Dhanaya. "Privacy preserving third party auditing in cloud. Dissertation" report, 2015.
- W. Zeng, Y Zhao, K. Ou, and W. Song. "Research on Cloud Storage Architecture and Key Technologies", 2009.
- S. More and S. Chaudhari, "Third party public auditing scheme for cloud storage," Procedia Computer Science, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.