Secure Cloud Data Computing with Third Party Auditor Control

被引:0
|
作者
Rathi, Apoorva [1 ]
Parmar, Nilesh [1 ]
机构
[1] Jawaharlal Inst Technol, Comp Sci & Engn, Borawan, India
关键词
Cloud Computing; Tokenization Centralized System; Security Alerts;
D O I
10.1007/978-3-319-12012-6_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
引用
收藏
页码:145 / 152
页数:8
相关论文
共 50 条
  • [1] Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage
    Abbdal, Salah H.
    Jin, Hai
    Zou, Deqing
    Yassen, Ali. A.
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 510 - 515
  • [2] An Efficient Framework for a Third Party Auditor in Cloud Computing Environments
    Mahdavi-Hezavehi S.
    Alimardani Y.
    Rahmani R.
    ITNOW, 2020, 4 (66) : 66
  • [3] DDoS prevention using third party auditor in cloud computing
    Rajat Saxena
    Somnath Dey
    Iran Journal of Computer Science, 2019, 2 (4) : 231 - 244
  • [4] An Efficient Framework for a Third Party Auditor in Cloud Computing Environments
    Mahdavi-Hezavehi, S.
    Alimardani, Y.
    Rahmani, R.
    COMPUTER JOURNAL, 2020, 63 (09): : 1285 - 1297
  • [5] Data Security and Privacy Assurance for Cloud Computing in Education Based on a Third Party Auditor
    Alim, Endy Sjaiful
    Jin, Hai
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 96 - 97
  • [6] ENSURING DATA STORAGE SECURITY THROUGH A NOVEL THIRD PARTY AUDITOR SCHEME IN CLOUD COMPUTING
    Han, Shuai
    Xing, Jianchuan
    2011 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS, 2011, : 264 - +
  • [7] A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor
    Wu, Yilun
    Lin, Xinye
    Lu, Xicheng
    Su, Jinshu
    Chen, Peixin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (10) : 2638 - 2642
  • [8] A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor
    Patel, Hiren
    Patel, Dhiren
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 84 - 87
  • [9] Secured Document Management through A Third Party Auditor Scheme in Cloud Computing
    Parasuraman, Kumar
    Srinivasababu, P.
    Angelin, S. Rajula
    Devi, T. Arumuga Maria
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 109 - 118
  • [10] Comparative Study On Trustee Of Third Party Auditor To Provide Integrity And Security In Cloud Computing
    Reddy, K. Shirisha
    Balaraju, M.
    MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 557 - 564