Privacy Preserving Third Party Auditing In Multi Cloud Storage Environment

被引:0
|
作者
Shashidhara, M. S. [1 ]
Jaini, C. P. [2 ]
机构
[1] Oxford Coll Engn, Comp Applicat, Bangalore, Karnataka, India
[2] Bharathiar Univ, Coimbatore, Tamil Nadu, India
关键词
Mutual authentication; Identity management; Access control; Distributed computing; Security analysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The on-demand, pay-per-use, and scalable services provided in cloud model guarantee to reduce capital as well as running expenditures for both hardware and software. In cloud environment, users can remotely store their data and access them from a shared pool of configurable computing resources, without local data storage burden. We discuss various methods related to the security and privacy capabilities in cloud paradigm especially data storage in multi cloud environment. We provide three models in form of multicloud architectures which allow categorizing the schemes and analyze them according to their security benefits. The different methods include, resource replication, split application system into tiers based on PIR methods, split both application logic and data into segments. In addition, since the integrity protection of data is a fearsome task in Cloud computing for users with limited computing resources, vulnerabilities in user data privacy are also possible in third party auditing. So we propose a safe cloud storage methodology which supports privacy-preserving third party auditing. And we study the outcomes to perform audits concurrently for multiple users in an efficient manner. Experimental results show that the third party auditing computation time is better than existing approach.
引用
收藏
页码:149 / 154
页数:6
相关论文
共 50 条
  • [41] Privacy preserving file auditing schemes for cloud storage using verifiable random function
    Mishra, Bharati
    Jena, Debasish
    Patnaik, Srikanta
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2021, 26 (01) : 50 - 75
  • [42] Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage
    REN Zhengwei
    WANG Lina
    WU Qianhong
    DENG Ruyi
    ChineseJournalofElectronics, 2014, 23 (02) : 297 - 301
  • [43] Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Jian
    Huang, Kun
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1513 - 1528
  • [44] Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
    Zhang, Jianhong
    Zhao, Xubing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 47 - 56
  • [45] Privacy-Preserving Cloud Auditing with Multiple Uploaders
    Wu, Ge
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2016, 2016, 10060 : 224 - 237
  • [46] Preserving Privacy in Public Auditing for Shared Cloud Data
    Anjali, R. S.
    Ravikumar, Aswathy
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 11 - 16
  • [47] Confidentiality Preserving Auditing for Cloud Computing Environment
    Mohanty, Suneeta
    Pattnaik, Prasant Kumar
    Kumar, Raghvendra
    2018 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN INTELLIGENT AND COMPUTING IN ENGINEERING (RICE III), 2018,
  • [48] Third Party Auditing for Service Assurance in Cloud Computing
    Zhang, Yanru
    Li, Xiang-Yang
    Han, Zhu
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [49] Utilizing Third Party Auditing to Manage Trust in the Cloud
    Rizvi, Syed
    Karpinski, Kelsey
    Kelly, Brennen
    Walker, Taryn
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 191 - 197
  • [50] Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage
    Zhao, Yubo
    Chang, Jinyong
    COMPUTER NETWORKS, 2022, 216