Privacy Preserving Third Party Auditing In Multi Cloud Storage Environment

被引:0
|
作者
Shashidhara, M. S. [1 ]
Jaini, C. P. [2 ]
机构
[1] Oxford Coll Engn, Comp Applicat, Bangalore, Karnataka, India
[2] Bharathiar Univ, Coimbatore, Tamil Nadu, India
关键词
Mutual authentication; Identity management; Access control; Distributed computing; Security analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The on-demand, pay-per-use, and scalable services provided in cloud model guarantee to reduce capital as well as running expenditures for both hardware and software. In cloud environment, users can remotely store their data and access them from a shared pool of configurable computing resources, without local data storage burden. We discuss various methods related to the security and privacy capabilities in cloud paradigm especially data storage in multi cloud environment. We provide three models in form of multicloud architectures which allow categorizing the schemes and analyze them according to their security benefits. The different methods include, resource replication, split application system into tiers based on PIR methods, split both application logic and data into segments. In addition, since the integrity protection of data is a fearsome task in Cloud computing for users with limited computing resources, vulnerabilities in user data privacy are also possible in third party auditing. So we propose a safe cloud storage methodology which supports privacy-preserving third party auditing. And we study the outcomes to perform audits concurrently for multiple users in an efficient manner. Experimental results show that the third party auditing computation time is better than existing approach.
引用
收藏
页码:149 / 154
页数:6
相关论文
共 50 条
  • [31] Effective Third Party Auditing in Cloud Computing
    Hussain, Mohammed
    Al-Mourad, Mohamed Basel
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 91 - 95
  • [32] Multi-Party Identity-Based Symmetric Privacy-Preserving Matching with Cloud Storage
    QIU Shuo
    LIU Jiqiang
    SHI Yanfeng
    HAN Zhen
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 426 - 432
  • [33] Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
    Liu, Hongyu
    Chen, Leiting
    Davar, Zahra
    Pour, Mohammad Ramezanian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 473 - 482
  • [34] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    Yang Zhen
    Wang Wenyu
    Huang Yongfeng
    Li Xing
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 179 - 187
  • [35] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    YANG Zhen
    WANG Wenyu
    HUANG Yongfeng
    LI Xing
    ChineseJournalofElectronics, 2019, 28 (01) : 179 - 187
  • [36] Privacy-preserving TPA auditing scheme based on skip list for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    International Journal of Network Security, 2019, 21 (03) : 451 - 461
  • [37] Pseudo-ID-based public auditing with privacy-preserving for cloud storage
    Liu, Xue-Yan
    He, Xiao-Mei
    Lu, Ting-Ting
    Journal of Computers (Taiwan), 2020, 31 (03) : 154 - 167
  • [38] PRIVACY-PRESERVING FOR A SECURE DATA STORAGE ON CLOUD USING PUBLIC AUDITING TECHNIQUE
    Suryawanshi, Akash Udaysinh
    Naveenkumar, J.
    IIOAB JOURNAL, 2018, 9 (02) : 111 - 115
  • [39] Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
    Jianhong Zhang
    Xubing Zhao
    Cluster Computing, 2016, 19 : 47 - 56
  • [40] Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage
    Ren Zhengwei
    Wang Lina
    Wu Qianhong
    Deng Ruyi
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 297 - 301