Secured Storage for Dynamic Data in Cloud

被引:0
|
作者
Ponnuramu, Veeralakshmi [1 ]
Tamilselvan, Latha [1 ]
机构
[1] BS Abdur Rahman Univ, Madras, Tamil Nadu, India
来源
关键词
confidentiality; remote integrity verification; dynamic data operations; public verifiability; symmetric encryption; data storage security; privacy preserving auditing;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud is a growing computing paradigm in which the services and resources are provisioned dynamically through internet. In cloud, the users' data can be stored in the remotely located data servers that are maintained by cloud service providers to relieve the users from the local storage and maintenance. The major security challenge with cloud computing is that the users cannot have direct control over the remotely stored data. The imperative security concerns in cloud are the integrity and confidentiality of data. Many existing remote integrity checking methods fail to serve for the data that can be dynamically updated. To preserve the privacy of dynamically changing data, an efficient approach maintaining the confidentiality and assuring the integrity of data is proposed. In this scheme, public auditability is enabled by introducing a Third Party Auditor (TPA) for verifying the data integrity. It is ensured that the data stored in the untrusted cloud server is confidential and consistent by using a data encryption algorithm called 2-Keys Symmetric Encryption. Unlike other encryption algorithms, this encryption algorithm needs lesser computation overhead. Encryption and decryption algorithms are developed in java and Remote Method Invocation (RMI) concepts are used for communication between client and server. Simulation environment is set up with the eucalyptus tool. The performance analysis and simulation results prove that our proposed scheme is secure and proficient and it reduces the computation cost of server and verifier.
引用
收藏
页码:53 / 61
页数:9
相关论文
共 50 条
  • [31] Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography
    Ahamed, N. Niyaz
    Duraipandian, N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 83 - 94
  • [32] Secured Geospatial Data Storage and Retrieval using Spatial Hadoop Framework in Cloud Environment
    Karthi, S.
    Prabu, S.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 73 - 76
  • [33] A secured data storage mechanism using Baye’s theorem and matrix for effective data communication in cloud
    Nithisha, J. (nithisha.j@gmail.com), 2021, Taiwan Academic Network Management Committee (22):
  • [34] A Secured Data Storage Mechanism Using Baye's Theorem and Matrix for Effective Data Communication in Cloud
    Nithisha, J.
    Jayarin, Jesu P.
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (04): : 843 - 854
  • [35] A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage
    Li, Xinlong
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [36] Secured Cloud Storage for Strategic Applications - A case study
    Aravindh, T.
    Chander, S. Shyam
    Rukmani, R.
    Kalaichelvi, G.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 292 - 296
  • [37] Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE
    Agarwal, Neha
    Rana, Ajay
    Pandey, J. P.
    Agarwal, Amit
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (01) : 44 - 66
  • [38] Multi-Cloud Based Secured Storage System
    Bramhe, M. V.
    Sarode, M. V.
    HELIX, 2018, 8 (05): : 4019 - 4023
  • [39] expanStor: Multiple Cloud Storage with Dynamic Data Distribution
    Wei, Yongmei
    Chen, Fengmin
    Sheng, David Chen Jia
    2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 85 - 90
  • [40] Authentication and enterprise secured data storage
    Cottin, N
    Mignot, B
    Wack, M
    ETFA 2001: 8TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 2, PROCEEDINGS, 2001, : 245 - 252