Secure Cloud Data Computing with Third Party Auditor Control

被引:0
|
作者
Rathi, Apoorva [1 ]
Parmar, Nilesh [1 ]
机构
[1] Jawaharlal Inst Technol, Comp Sci & Engn, Borawan, India
关键词
Cloud Computing; Tokenization Centralized System; Security Alerts;
D O I
10.1007/978-3-319-12012-6_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
引用
收藏
页码:145 / 152
页数:8
相关论文
共 50 条
  • [21] Effective Third Party Auditing in Cloud Computing
    Hussain, Mohammed
    Al-Mourad, Mohamed Basel
    2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 91 - 95
  • [22] A Practical Third-Party Auditor Prototype for Cloud Storage Service
    Yeh, Lo-Yao
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 796 - 799
  • [23] A Survey for Secure Communication of Cloud Third Party Authenticator
    Baghel, Sawan V.
    Theng, Deepti P.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 51 - 54
  • [24] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [25] Secure pervasive computing without a Trusted Third Party
    Pirzada, AA
    McDonald, C
    IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
  • [26] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
    Sasha Mahdavi Hezavehi
    Rouhollah Rahmani
    Cluster Computing, 2020, 23 : 2609 - 2627
  • [27] An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
    Hezavehi, Sasha Mahdavi
    Rahmani, Rouhollah
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2609 - 2627
  • [28] Interactive anomaly-based DDoS attack detection method in cloud computing environments using a third party auditor
    Hezavehi, Sasha Mahdavi
    Rahmani, Rouhollah
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 178 : 82 - 99
  • [29] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [30] Secure storage of data in cloud computing
    20150500466883
    (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):