Secure Cloud Data Computing with Third Party Auditor Control

被引:0
|
作者
Rathi, Apoorva [1 ]
Parmar, Nilesh [1 ]
机构
[1] Jawaharlal Inst Technol, Comp Sci & Engn, Borawan, India
关键词
Cloud Computing; Tokenization Centralized System; Security Alerts;
D O I
10.1007/978-3-319-12012-6_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
引用
收藏
页码:145 / 152
页数:8
相关论文
共 50 条
  • [31] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [32] Secure third party distribution of XML data
    Carminati, B
    Ferrari, E
    Bertino, E
    ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 547 - 548
  • [33] Third Party Auditing for Service Assurance in Cloud Computing
    Zhang, Yanru
    Li, Xiang-Yang
    Han, Zhu
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [34] Secure cloud computing for genomic data
    Datta, Somalee
    Bettinger, Keith
    Snyder, Michael
    NATURE BIOTECHNOLOGY, 2016, 34 (06) : 588 - 591
  • [35] Secure cloud computing for genomic data
    Somalee Datta
    Keith Bettinger
    Michael Snyder
    Nature Biotechnology, 2016, 34 : 588 - 591
  • [36] Verifying cloud service-level agreement by a third-party auditor
    Zhang, Hongli
    Ye, Lin
    Shi, Jiantao
    Du, Xiaojiang
    Guizani, Mohsen
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 492 - 502
  • [37] Integrity Checking Privacy Preserving Approach to Cloud Using Third Party Auditor
    Thosar, Sonali D.
    Mhetre, Nalini A.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [38] Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment
    Rizvi, Syed
    Cover, Katie
    Razaque, Abdul
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 31 - 36
  • [39] Secure and efficient data access control in cloud computing environment: A survey
    Namasudra, Suyel
    Roy, Pinki
    MULTIAGENT AND GRID SYSTEMS, 2016, 12 (02) : 69 - 90
  • [40] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17):