Secure Cloud Data Computing with Third Party Auditor Control

被引:0
|
作者
Rathi, Apoorva [1 ]
Parmar, Nilesh [1 ]
机构
[1] Jawaharlal Inst Technol, Comp Sci & Engn, Borawan, India
关键词
Cloud Computing; Tokenization Centralized System; Security Alerts;
D O I
10.1007/978-3-319-12012-6_17
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud Computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
引用
收藏
页码:145 / 152
页数:8
相关论文
共 50 条
  • [41] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [42] The Effect of Third Party Auditor and Quality of Service through Cloud Storage Security to Cloud User Trust
    Handoko, Bambang Leo
    Widuri, Rindang
    Sarjono, Haryadi
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1397 - 1401
  • [43] Research of Data Secure Based on Cloud Computing
    Shi Yan-rong
    Zhao Xiao-fang
    Chen Shu-yin
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 202 - 204
  • [44] Secure Data Process in Distributed Cloud Computing
    Sharmila, P.
    Danapaquiame, N.
    Subhapriya, R.
    Janakiram, A.
    Amudhavel, J.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 75 - 84
  • [45] Data storage with secure boundary in cloud computing
    Zhu, Shuaishuai
    Han, Yiliang
    ICIC Express Letters, 2014, 8 (09): : 2389 - 2394
  • [46] A Secure and Searchable Data Storage in Cloud Computing
    Gupta, Sarika
    Satapathy, Sangita Rani
    Mehta, Piyush
    Tripathy, Anupam
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 106 - 109
  • [47] Information Flow Control for Secure Cloud Computing
    Bacon, Jean
    Eyers, David
    Pasquier, Thomas F. J. -M.
    Singh, Jatinder
    Papagiannis, Ioannis
    Pietzuch, Peter
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01): : 76 - 89
  • [48] Trusted Third Party for Data Security in Cloud Environment
    Katre, Noopur
    Theng, Deepti
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 670 - 672
  • [49] Protection of Identity Information in Cloud Computing without Trusted Third Party
    Ranchal, Rohit
    Bhargava, Bharat
    Ben Othmane, Lotfi
    Lilien, Leszek
    Kim, Anya
    Kang, Myong
    Linderman, Mark
    2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 368 - 372
  • [50] Third Party Compliance to IT Regulations in Indonesia: Challenges Posed by Cloud Computing
    Setiyawan, Dodi
    Hu, Wang
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, VOLS I & II, 2017, : 469 - 475