oalogo2  

AUTHOR(S):

P.Veeralakshmi, Latha Tamilselvan

 

TITLE

Security For Dynamic Data Storage in Cloud

pdf PDF

ABSTRACT

Cloud provides variety of services and resources dynamically through internet. In cloud, the users avail the storage space provided by cloud service providers. In this , the users do not have direct control over the remotely stored data. The imperative security concerns in cloud are the integrity and confidentiality of data. To preserve the privacy of dynamically changing data, an efficient approach maintaining the confidentiality and assuring the integrity of data is proposed. In this scheme, public auditability is enabled by introducing a third party auditor . We ensure that the data stored in the untrusted cloud server is confidential and consistent by 2-keys Symmetric Encryption. Unlike other encryption algorithms, this needs lesser computation overhead. Simulation environment is set up with the eucalyptus tool. The performance analysis and simulation results prove that our proposed scheme is secure and proficient by reducing the computation cost of server and user.

KEYWORDS

Dynamic data Operations, Public Verifiability, Symmetric Encryption, Confidentiality, Remote Integrity, Data Storage Security, Privacy Preserving Auditing

REFERENCES

[1] Veeralakshmi Ponnuramu, and Latha Tamilselvan., (2014), „Encryption for Massive Storage in Cloud‟ in Computational intelligence in Data Mining, Volume 2,pp 27- 38, Smart Innovation, Systems ,and Technologies(Springer), volume 32.

[2] C.Wang , Q.Wang, S.S.M.Chow, K.Ren,W.Lou, (2013) , „Privacy-Preserving Public Auditing for Secure Cloud Storage‟ , IEEE Transactions on Computers , Vol 62, No.2,.

[3] Ponnuramu Veeralakshmi. and Latha Tamilselvan, (2012).‟ Data integrity proof and secure computation in cloud computing‟. J. Comput. Sci., 8: 1987-1995.

[4] Kan Yang, Xiaohua (2013) „ An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing‟, IEEE Transactions On Parallel and Distributed systems,VOL 24, NO. pp.1717-1726.

[5] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, (2012),‟Toward Secure and Dependable Storage Services in Cloud Computing‟, IEEE Transactions On Services Computing,VOL. 5, NO. 2, pp.220-232.

[6] Pearson,(2009), „Taking Account of Privacy when Designing Cloud Computing Services‟, in Proceedings of ICSE-Cloud’09, Vancouver.

[7] A.Juels and B. S. Kaliski, Jr.,(2007),‟Pors: proofs of retrievability for large files,‟ in CCS .‟07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, pp. 584–597.

[8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song,(2007), „Provable data possession at untrusted stores,‟ in CCS ‟07: Proceedings of the 14th ACM conference on Computer and communications security. New York, NY, USA: ACM, pp. 598– 609.

[9] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou,(2011), „Enabling public auditability and data dynamics for storage security in cloud computing,‟ IEEE Transactions On Parallel and Distributed systems,VOL. 22, NO. 5, pp.847- 858.

[10] M. Jensen, et al.,(2009), „On Technical Security Issues in Cloud Computing,‟ in IEEE International Conference on Cloud Computing, Bangalore, India, pp. 109-116.

[11] Lifei Wei , Haojin Zhu, Zhenfu Cao, Weiwei Jia,(2010), „SecCloud: Bridging secure storage and computation in cloud‟, in ICDCS‟10.

[12] C.Wang, Q. Wang, K. Ren, and W. Lou, (2009), ‟Ensuring Data Storage Security in Cloud Computing,‟ in Proc. of IWQoS’09.

[13] H. Shacham and B. Waters,(2008), „Compact Proofs of Retrievability,‟, Proc. 14th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology pp.90-107.

[14] E.-C. Chang and J. Xu,(2008), „Remote integrity check with dishonest storage server,‟ in Proc. Of ESORICS’08.Berlin, Heidelberg: Springer-Verlag, pp. 223–237.

[15] C. Wang, Q. Wang, K. Ren, and W. Lou,(2010), „Privacy- Preserving Public Auditing for Data Storage Security in Cloud Computing,‟Proc. IEEE INFOCOM, pp. 525-533.

[16] Y. Zhu, H. Hu, G. Ahn, and M. Yu,(2012), „Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage‟, IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244.

[17] Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, (2007), ‟Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds,‟,Proc. ACM Symp. Applied Computing, pp. 1550-1557.

[18] W. Stallings, Cryptography and network security principles and practice, Fourth edition, Prentice hall, 2007

Cite this paper

P.Veeralakshmi, Latha Tamilselvan. (2018) Security For Dynamic Data Storage in Cloud. International Journal of Computers, 3, 8-19

 

cc.png
Copyright © 2018 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0