ENSURING DATA STORAGE SECURITY THROUGH A NOVEL THIRD PARTY AUDITOR SCHEME IN CLOUD COMPUTING

被引:0
|
作者
Han, Shuai [1 ]
Xing, Jianchuan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
关键词
cloud computing; third party auditor; data storage; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing technology has been looked upon as the next-generation architecture of IT solution. It enables the users to move their data and application software to the network which is different from traditional solutions. Due to this IT services are not under logical, physical and users' controls, it brings many new different security challenges. Ensuring data storage security is one more urgent of them. The representative network architecture for cloud data storage includes a third party auditor which affords trustful authentication for user to operate their data security in cloud. In this paper, we study the problem of data storage security in cloud computing. A novel third party auditor scheme is proposed. The obvious advantage of our scheme is the cloud service provider can offer the functions which were provided by the traditional third party auditor and make it trustful So it indeed reduces the constitution ' s complexity in Cloud Computing.
引用
收藏
页码:264 / +
页数:3
相关论文
共 50 条
  • [21] Third Party Public Auditing scheme for Cloud Storage
    More, Swapnali
    Chaudhari, Sangita
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 69 - 76
  • [22] Ensuring Data Storage Security in Cloud. Computing Based on Hybrid Encryption Schemes
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 320 - 325
  • [23] A Trusted Third-Party (TTP) based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment
    Rizvi, Syed
    Cover, Katie
    Gates, Christopher
    COMPLEX ADAPTIVE SYSTEMS, 2014, 36 : 381 - 386
  • [24] A Novel Scheme for Data Security in Cloud Computing using Quantum Cryptography
    Sharma, Geeta
    Kalra, Sheetal
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,
  • [25] Privacy Preservation Models for Third-Party Auditor over Cloud Computing: A Survey
    Razaque, Abdul
    Frej, Mohamed Ben Haj
    Alotaibi, Bandar
    Alotaibi, Munif
    ELECTRONICS, 2021, 10 (21)
  • [26] Trusted Third Party for Data Security in Cloud Environment
    Katre, Noopur
    Theng, Deepti
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 670 - 672
  • [27] A framework for Data Security and Storage in Cloud Computing
    Bhandari, Akshita
    Gupta, Ashutosh
    Das, Debasis
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [28] A Novel Storage and Search Scheme in Cloud Computing
    Fang, Jing
    He, Jingsha
    Pathan, Muhammad Salman
    Gao, Mengchen
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 304 - 308
  • [29] A data encryption scheme for cloud storage security
    Wu, Wei-nong
    Zheng, Yuan-bing
    Wu, Bin
    Wu, Lie
    WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 666 - 674
  • [30] A scheme to ensure data security of cloud storage
    Wang, Huifeng
    Li, Zhanhuai
    Zhao, Xiaonan
    Qi, Chanying
    He, Qinlu
    Sun, Jian
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 79 - 82