Security and Privacy issues in Cloud Computing
|
|
|
- Nora Harmon
- 10 years ago
- Views:
Transcription
1 Security and Privacy issues in Cloud Computing Siddharth Walia* ABSTRACT Cloud computing is a rapidly developing technology using internet and remote servers to maintain data and applications. The main aim of cloud computing is to provide ondemand services with scalability, reliability and availability. IBM, Amazon, Google, Microsoft are making millions of dollars each day by providing cloud services to users all over the world. In this paper, we provide an overview of cloud computing and then discuss some of the major security and privacy issues occurring in the cloud environment. We discuss about the techniques and approaches proposed by researches to tackle these problems. Some of the issues we discussed in the paper are privacy, integrity, security, trust, compliance and availability. REFERENCES [1] [2] R. Arora, A. Parashar, and C. C. I. Transforming.Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 3(4): ,2013. [3] A. Aviram, S. Hu, B. Ford, and R. Gummadi.Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages ACM,2010. [4] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, 1(1):11 33, [5] J. Baker, C. Bond, J. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. L éon, Y. Li, A. Lloyd, and V. Yushprakh. Megastore: Providing scalable, highly available storage for interactive services. In CIDR, volume 11, pages , [6] A. Behl and K. Behl. Security paradigms for cloud computing. In Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference on, pages IEEE, [7] K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security, pages ACM, *Queen s University, Kingston, Canada
2 [8] B. Calder, J. Wang, A. Ogus, N. Nilakantan, A. Skjolsvold, S. McKelvie, Y. Xu, S. Srivastav, J. Wu, H. Simitci, et al. Windows azure storage: a highly available cloud storage service with strong consistency. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages ACM, [9] D. Chen and H. Zhao. Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, volume 1, pages IEEE, [10] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina. Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security, pages ACM, [11] J. Dean and S. Ghemawat. Mapreduce: a flexible data processing tool. Communications of the ACM, 53(1):72 77, [12] M. Descher, P. Masser, T. Feilhauer, A. M. Tjoa, and D. Huemer. Retaining data control to the client in infrastructure clouds. In Availability, Reliability and Security, ARES 09. International Conference on, pages IEEE, [13] C. Gentry. A fully homomorphic encryption scheme. PhD thesis, Stanford University, [14] A. Haeberlen. A case for the accountable cloud. ACM SIGOPS Operating Systems Review, 44(2):52 57, [15] A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. In OSDI, pages , [16] seven-cloud-computingsecurity-risks 853. [17] [18] I. Iankoulova and M. Daneva. Cloud computing security requirements: A systematic review. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, pages 1 7. IEEE, [19] J. Idziorek, M. Tannian, and D. Jacobson. Detecting fraudulent use of cloud resources. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages ACM, [20] W. Itani, A. Kayssi, and A. Chehab. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In Dependable, Autonomic
3 and Secure Computing, DASC 09. Eighth IEEE International Conference on, pages IEEE, [21] R. Latif, H. Abbas, S. Assar, and Q. Ali. Cloud computing risk assessment: A systematic literature review. In Future Information Technology, pages Springer, [22] H. Liu. A new form of dos attack in a cloud and its avoidance mechanism. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, pages ACM, [23] S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen. Virtualization security for cloud computing service. In Cloud and Service Computing (CSC), 2011 International Conference on, pages IEEE, [24] P. Mell and T. Grance. The nist definition of cloud computing. National Institute of Standards and Technology, 53(6):50, [25] U. F. Minhas, S. Rajagopalan, B. Cully, A. Aboulnaga, K. Salem, and A. Warfield. Remusdb: Transparent high availability for database systems. The VLDB Journal, 22(1):29 45, [26] A. K. Mishra, P. Matta, E. S. Pilli, and R. Joshi. Cloud forensics: State-of-theart and research challenges. In Cloud and Services Computing (ISCOS), 2012 International Symposium on, pages IEEE, [27] E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby. Enhanced data security model for cloud computing. In Informatics and Systems (INFOS), th International Conference on, pages CC 12. IEEE, [28] S. Pearson and A. Benameur. Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, pages IEEE, [29] S. Ramgovind, M. M. Eloff, and E. Smith. The management of security in cloud computing. In Information Security for South Africa (ISSA), 2010, pages 1 7. IEEE, [30] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, pages ACM, [31] A.-R. Sadeghi, T. Schneider, and M. Winandy. Token-based cloud computing. In Trust and Trustworthy Computing, pages Springer, 2010.
4 [32] N. Santos, K. P. Gummadi, and R. Rodrigues. Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing, pages 3 3. San Diego, California, [33] V. Sekar and P. Maniatis. Verifiable resource accounting for cloud computing services. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages ACM, [34] A. Squicciarini, S. Sundareswaran, and D. Lin. Preventing information leakage from indexing in the cloud. In Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, pages IEEE, [35] H. Takabi, J. B. Joshi, and G.-J. Ahn. Securecloud: Towards a comprehensive security framework for cloud computing environments. In Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual, pages IEEE, [36] H. Tianfield. Security issues in cloud computing. In Systems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on, pages IEEE, [37] A. Ukil, D. Jana, and A. De Sarkar. A security framework in cloud computing infrastructure. International Journal of Network Security & Its Applications, 5(5), [38] C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1 9. IEEE, [39] C. Wang and Y. Zhou. A collaborative monitoring mechanism for making a multitenant platform accountable. Proc. HotCloud, [40] L. Wei, H. Zhu, Z. Cao, W. Jia, and A. V. Vasilakos. Seccloud: Bridging secure storage and computation in cloud. In Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on, pages IEEE, [41] Z. Xiao and Y. Xiao. Accountable mapreduce in cloud computing. SCNC 2011, [42] Z. Xiao and Y. Xiao. Security and privacy in cloud computing. Communications Surveys & Tutorials, IEEE, 15(2): , [43] Z. Yandong and Z. Yongsheng. Cloud computing and cloud security challenges. In Information Technology in Medicine and Education (ITME), 2012 International Symposium on, volume 2, pages IEEE, [44] J. Yang and Z. Chen. Cloud computing research and security issues. In Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on, pages 1 3. IEEE, 2010.
5 [45] P. You, Y. Peng, W. Liu, and S. Xue. Security issues and solutions in cloud computing. In Distributed Computing Systems Workshops (ICDCSW), nd International Conference on, pages IEEE, [46] H. Yu, N. Powell, D. Stembridge, and X. Yuan. Cloud computing and security challenges. In Proceedings of the 50th Annual Southeast Regional Conference, pages ACM, [47] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1 9. Ieee, [48] Y. Zhang, A. Juels, A. Oprea, and M. K. Reiter. Homealone: Co-residency detection in the cloud via side-channel analysis. In Security and Privacy (SP), 2011 IEEE Symposium on, pages IEEE, 2011.
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
5) Detailed description of problems/hypotheses you are planning to investigate.
Cloud Computing/Cloud Storage Project Specification 1) List of team members. Krystal Carlton, Amir Koupaei, Cody Jenkins 2) The exact title of your project (it can be different than a corresponding project
Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
Information Security Management System for Cloud Computing
ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Multi Tenancy Access Control Using Cloud Service in MVC
Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Survey Paper on Integrity Auditing of Storage
International Journal of Computational Engineering Research Vol, 04 Issue, 3 Survey Paper on Integrity Auditing of Storage Ugale Santosh A 1 1M.E. Computer AVCOE, Sangmner, India ABSTRACT: Cloud servers
Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
Survey on Data security Issues in Cloud Environment
Survey on Data security Issues in Cloud Environment Vasanth.C.Bhagawat Research Scholar/ Computer Science Bharathiar University, Coimbatore Dr. A.Arul L.S.Kumar Prof & Dean, Dept. of. CSE RGIT, Bangalore.
Resource Allocation for Security Services in Mobile Cloud Computing
IEEE INFOCOM 211 Workshop on M2MCN-211 Resource Allocation for Security Services in Mobile Cloud Computing Hongbin Liang 12 Dijiang Huang 3 LinX.Cai 2 Xuemin (Sherman) Shen 2 Daiyuan Peng 1 1 School of
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES
COST EFFECTIVE PRIVACY PRESERVED INTERMEDIATE DATASETS FOR CLOUD DATA SERVICES Chaya.Y.K 1, Bharathi V Kalmath 2 1 PG Student, Department of CSE, S.V.C.E,Bengaluru 2 Asst.Professor, Department of CSE,
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
A Survey on Secure Storage Services in Cloud Computing
Global Journal of Computer Science and Technology Cloud & Distributed Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE
ASSURING INTEGRITY OF DATAFLOW PROCESSING IN CLOUD COMPUTING INFRASTRUCTURE R.Genga devi 1, K.Anitha 2, M.Murugeshwari 3,S.vidhya 4, Dr.K.Ramasamy 5 1, 2, 3- UG STUDENT, P.S.R.RENGASAMY COLLEGE OF ENGINEERING
Review Article Data Security and Privacy in Cloud Computing
International Journal of Distributed Sensor Networks, Article ID 190903, 9 pages http://dx.doi.org/10.1155/2014/190903 Review Article Data Security and Privacy in Cloud Computing Yunchuan Sun, 1 Junsheng
Service and Data Security for Multi Cloud Environment
Service and Data Security for Multi Cloud Environment Rajkumar B 1, Balamurugan K 2 M.Tech, Dept of IT, K.S.R. College of Engineering, Tamilnadu, India 1 Associate Professor, Dept of IT, K.S.R. College
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE
TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE 1 C. MERLIN PAULIESTHER, 2 DR.J.VISUMATHI 1 Assistant Professor,Department of Information Tecnology, Sathyabama University 2 Professor, Department
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
A Survey on Privacy-Preserving Techniques for Secure Cloud Storage
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFICIENT DISCOVERY OF INTEGRITY AUTOMATION IN HYBRID CLOUD COMPUTING K.Saipriya 1, A.Ravi Kumar 2 1 M.Tech Student, Dept of
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
A Conceptual Framework to analyze UML notations using SaaS : U-Code Generation
A Conceptual Framework to analyze UML notations using SaaS : U-Code Generation R.Lalitha 1, Dr.B.Latha 2, Dr.G.Sumathi 3 1 Prof. & Head, 2 Prof. & Head, 3Prof. & Head Dept. Of CSE, Dept. Of CSE, Dept.
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment Quang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa and Theo Dimitrakos Etisalat
M. Nathiya 2 B.Tech. (IT), M.E. (CSE), Assistant Professor, Shivani Engineering College, Trichy, Tamilnadu, India.
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Robust Data
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework
A Survey on Trust Based Security and Privacy Issues of Cloud Computing Framework Usvir Kaur 1 Dr. Dheerendra Singh 2 Assistant Professor, Dept. of Computer Science & Engineering, Sri Guru Granth Sahib
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Research on Storage Techniques in Cloud Computing
American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
A Secure Cloud Storage Virtualization Model And user Authentication using Threshold Kerberosv5 Scheme
A Secure Cloud Storage Virtualization Model And user Authentication using Threshold Kerberosv5 Scheme Kavery PM Afroz Pasha M.tech CSE, Asst. Prof, CSE(UG) Nitte Meenakshi Institute Of Technology Nitte
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Preserving Data Integrity and Public Auditing for Data Storage in Cloud Computing
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7829-7833 Preserving Data Integrity and Public Auditing for Data Storage
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 3 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Using Third Party
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
International Journal of Infinite Innovations in Engineering and Technology. ISSN (Online): 2349-2287, ISSN (Print): 2349-2279 2015
SECURED AUDITING SYSTEM FOR CLOUD DATA STORAGE WITH ERROR CORRECTION GUARANTEES 1 S.Sathya, 2 S.Sivakumar 1 Research Scholar, Department of Computer Science & Applications, PGP College of Arts & Science,
Cloud Battlefield Support and Security Assessment
Defining the Cloud Battlefield Supporting Security Assessments by Cloud Customers Sören Bleikertz 1 Toni Mastelić 2 3 Wolter Pieters 4 Trajce Dimkov 5 1 IBM Research - Zurich 2 Vienna University of Technology
Reduce cost and efficient access for cloud storage Using Intermediate Cloud Datasets
International Journal of Scientific and Research Publications, Volume 4, Issue 9, September 2014 1 Reduce cost and efficient access for cloud storage Using Intermediate Cloud Datasets Dr.R.Mala *, M.Lakshmi
Privacy preserving technique to secure cloud
Vitthal S. Gutte Pune University, MIT College of engineering, Kothrud, Pune 411038, India [email protected] Privacy preserving technique to secure cloud Prof. Priya Deshpande Pune University,
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing
Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),
COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)
ISSN:2320-0790 Secured Data on Cloud Environment by SAPA Protocol with Auto-renewal K. Prashanthi 1, P. Sangamithirai 2, S.Pothumani 3 1,2 B.Tech Student(CSE), Bharath University, Chennai-73. 3, Assistant
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105
Secure Storage Services and Erasure Code Implementation in Cloud Servers
Secure Storage Services and Erasure Code Implementation in Cloud Servers G. Rahul Reddy 1, N. J. Subashini 2 1 Research Scholar, M.Tech, Cloud Computing, Dept of Information Technology, SRM University,
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Remote Data Auditing Scheme in Secured Cloud Storage Environment
Remote Data Auditing Scheme in Secured Cloud Storage Environment Sangeetha.T 1,Saranya.M 2 PG Scholar 1, Assistant Professor 2 Nandha College of Technology, Erode, India [email protected] 1,[email protected]
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
Security of Data from Public - Using Cloud Storage
Security of Data from Public - Using Cloud Storage T.Gopika #1, J.Haripriya #2, R.Ilakiyashri #3, S.Praveenkumar #4 UG Student, Dept. of CSE, Anand Institute of Higher Technology, Chennai, Tamil Nadu,
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
A Survey on Data Storage Security in Cloud Computing
ISSN: 2393-994X Karpagam Journal of Engineering Research (KJER) Vol: 5, 1, Special Issue on A Survey on Data Storage Security in Cloud Computing A.Amali Angel Punitha M.E 1, G.Indumathi M.E,Ph.D 2 1 Assistant
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
M Hasan Islam Department of Computer Sciences CASE Islamabad, Pakistan email: [email protected]
Cloud Computing Security Auditing Irfan Gul, Atiq ur Rehman Department of Computer Sciences SZABIST Islamabad, Pakistan email: [email protected], [email protected] M Hasan Islam Department of Computer
