ENSURING DATA STORAGE SECURITY THROUGH A NOVEL THIRD PARTY AUDITOR SCHEME IN CLOUD COMPUTING

被引:0
|
作者
Han, Shuai [1 ]
Xing, Jianchuan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
关键词
cloud computing; third party auditor; data storage; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing technology has been looked upon as the next-generation architecture of IT solution. It enables the users to move their data and application software to the network which is different from traditional solutions. Due to this IT services are not under logical, physical and users' controls, it brings many new different security challenges. Ensuring data storage security is one more urgent of them. The representative network architecture for cloud data storage includes a third party auditor which affords trustful authentication for user to operate their data security in cloud. In this paper, we study the problem of data storage security in cloud computing. A novel third party auditor scheme is proposed. The obvious advantage of our scheme is the cloud service provider can offer the functions which were provided by the traditional third party auditor and make it trustful So it indeed reduces the constitution ' s complexity in Cloud Computing.
引用
收藏
页码:264 / +
页数:3
相关论文
共 50 条
  • [31] A Trusted Third Party-based Authentication Scheme in Cloud Computing
    Li, Ying
    Du, Li-Ping
    Zhao, Gui-Fen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 850 - 856
  • [32] Comparison of Privacy-Preserving Models based on a Third-Party Auditor in Cloud Computing
    Frej, Mohamed Ben Haj
    Dichter, Julius
    Gupta, Navarun
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 86 - 91
  • [33] Ensuring Data Security by AES for Global Software Development in Cloud Computing
    Usman, Muhammad
    Akram, Usman
    2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
  • [34] An Effective Integrity Verification Scheme for Ensuring Data Integrity in Cloud Computing
    Kamboj, Minakshi
    Rana, Sanjeev
    INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2021, 2022, 419 : 42 - 54
  • [35] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (06): : 75 - 82
  • [36] Improving Data Integrity for Data Storage Security in Cloud Computing
    Pardeshi, Poonam M.
    Borade, Deepali R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 61 - 67
  • [37] Research on the Data Storage Security based on Cloud Computing
    Ma, Xinqiang
    Huang, Yi
    Zhang, Yongdan
    Liu, Youyuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS, 2015, 15 : 326 - 331
  • [38] Study on Strategy of Cloud Computing Data Storage Security
    Liu, Sha
    Zhu, Shuhua
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 64 - 67
  • [39] A Framework to Ensure Data Storage Security in Cloud Computing
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [40] Secure dynamic data storage with Third Party Arbitration in cloud
    Pacheco, Andre E. A.
    Colaco, Louella M. Mesquita
    Desai, Shaba
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 118 - 122