Privacy Preserving Third Party Auditing In Multi Cloud Storage Environment

被引:0
|
作者
Shashidhara, M. S. [1 ]
Jaini, C. P. [2 ]
机构
[1] Oxford Coll Engn, Comp Applicat, Bangalore, Karnataka, India
[2] Bharathiar Univ, Coimbatore, Tamil Nadu, India
关键词
Mutual authentication; Identity management; Access control; Distributed computing; Security analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The on-demand, pay-per-use, and scalable services provided in cloud model guarantee to reduce capital as well as running expenditures for both hardware and software. In cloud environment, users can remotely store their data and access them from a shared pool of configurable computing resources, without local data storage burden. We discuss various methods related to the security and privacy capabilities in cloud paradigm especially data storage in multi cloud environment. We provide three models in form of multicloud architectures which allow categorizing the schemes and analyze them according to their security benefits. The different methods include, resource replication, split application system into tiers based on PIR methods, split both application logic and data into segments. In addition, since the integrity protection of data is a fearsome task in Cloud computing for users with limited computing resources, vulnerabilities in user data privacy are also possible in third party auditing. So we propose a safe cloud storage methodology which supports privacy-preserving third party auditing. And we study the outcomes to perform audits concurrently for multiple users in an efficient manner. Experimental results show that the third party auditing computation time is better than existing approach.
引用
收藏
页码:149 / 154
页数:6
相关论文
共 50 条
  • [21] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [22] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [23] Privacy-Preserving Time-Based Auditing for Secure Cloud Storage
    Wang, Min
    Yu, Jia
    Shen, Wenting
    Hao, Rong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7866 - 7878
  • [24] AN EFFICIENT, DYNAMIC, PRIVACY PRESERVING PUBLIC AUDITING METHOD ON UNTRUSTED CLOUD STORAGE
    Navajothi, R.
    Fenelon, S. Jean Adrien
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [25] A Novel Preserving Client Privacy and Designate Verifier Auditing Scheme for Cloud Storage
    Xu, Jiang
    Chen, Wenliang
    Ji, Sai
    Ren, Yongjun
    Wang, Jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 295 - 304
  • [26] Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain
    Miao, Ying
    Huang, Qiong
    Xiao, Meiyan
    Li, Hongbo
    IEEE ACCESS, 2020, 8 : 139813 - 139826
  • [27] Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium
    Shen, Wenting
    Yu, Jia
    Xia, Hui
    Zhang, Hanlin
    Lu, Xiuqing
    Hao, Rong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 82 : 56 - 64
  • [28] Privacy preserving auditing for shared data in cloud
    Ghutugade, Kalyani B.
    Patil, G. A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 300 - 305
  • [29] Light-weight Accountable Privacy Preserving (LAPP) Protocol to Determine Dishonest Role of Third Party Auditor in Cloud Auditing
    Frej, Mohamed Ben Haj
    Dichter, Julius
    Gupta, Navarun
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [30] Integrity Checking Privacy Preserving Approach to Cloud Using Third Party Auditor
    Thosar, Sonali D.
    Mhetre, Nalini A.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,