Secured Storage for Dynamic Data in Cloud

被引:0
|
作者
Ponnuramu, Veeralakshmi [1 ]
Tamilselvan, Latha [1 ]
机构
[1] BS Abdur Rahman Univ, Madras, Tamil Nadu, India
来源
关键词
confidentiality; remote integrity verification; dynamic data operations; public verifiability; symmetric encryption; data storage security; privacy preserving auditing;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cloud is a growing computing paradigm in which the services and resources are provisioned dynamically through internet. In cloud, the users' data can be stored in the remotely located data servers that are maintained by cloud service providers to relieve the users from the local storage and maintenance. The major security challenge with cloud computing is that the users cannot have direct control over the remotely stored data. The imperative security concerns in cloud are the integrity and confidentiality of data. Many existing remote integrity checking methods fail to serve for the data that can be dynamically updated. To preserve the privacy of dynamically changing data, an efficient approach maintaining the confidentiality and assuring the integrity of data is proposed. In this scheme, public auditability is enabled by introducing a Third Party Auditor (TPA) for verifying the data integrity. It is ensured that the data stored in the untrusted cloud server is confidential and consistent by using a data encryption algorithm called 2-Keys Symmetric Encryption. Unlike other encryption algorithms, this encryption algorithm needs lesser computation overhead. Encryption and decryption algorithms are developed in java and Remote Method Invocation (RMI) concepts are used for communication between client and server. Simulation environment is set up with the eucalyptus tool. The performance analysis and simulation results prove that our proposed scheme is secure and proficient and it reduces the computation cost of server and verifier.
引用
收藏
页码:53 / 61
页数:9
相关论文
共 50 条
  • [41] RETRACTED: Secured storage and disease prediction of E-health data in cloud (Retracted Article)
    Karuppiah, Sundara Velrani
    Gurunathan, Geetha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (06) : 6295 - 6306
  • [42] AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage
    Tchernykh, Andrei
    Babenko, Mikhail
    Chervyakov, Nikolay
    Miranda-Lopez, Vanessa
    Kuchukov, Viktor
    Cortes-Mendoza, Jorge M.
    Deryabin, Maxim
    Kucherov, Nikolay
    Radchenko, Gleb
    Avetisyan, Arutyun
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2018, 102 : 60 - 73
  • [43] AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage
    Tchernykh, Andrei (chernykh@cicese.mx), 1600, Elsevier Inc. (102):
  • [44] Orchini Similarity User Authentication Based Streebog Hash Function for Secured Data Storage in Cloud
    Bebe, P. Calista
    Akila, D.
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 468 - 473
  • [45] An Efficient and Secured Data Storage Scheme in Cloud Computing Using ECC-based PKI
    Yin, XiaoChun
    Liu, ZengGuang
    Lee, Hoon Jae
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 523 - 527
  • [46] Secured data partitioning in multi cloud environment
    Hasan, Hazila
    Chuprat, Suriayati
    2014 4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2014, : 146 - 151
  • [47] Systematic Hierarchy Based Secured Access Control in Cloud Storage
    Rathore, Harshwardhan
    Chouragade, P. M.
    2017 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRICAL, ELECTRONICS AND COMPUTING TECHNOLOGIES (ICRTEECT), 2017, : 169 - 172
  • [48] A secured cloud storage auditing with empirical outsourcing of key updates
    Vijayakumar K.
    Suchitra S.
    Swathi Shri P.
    International Journal of Reasoning-based Intelligent Systems, 2019, 11 (02) : 109 - 114
  • [49] A Secured Event Log Storage Management System In Cloud Computing
    Vinitha, D. Esther Grace
    Duela, J. Shiny
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [50] Secured data storage in the cloud using logical Pk-Anonymization with Map Reduce methods and key generation in cloud computing
    Kumar, Sindhe Phani
    Anandan, R.
    Tchier, Fairouz
    Rajchakit, G.
    Park, Choonkil
    Tawfiq, Ferdous M. O.
    JOURNAL OF TAIBAH UNIVERSITY FOR SCIENCE, 2021, 15 (01): : 746 - 756