ENSURING DATA STORAGE SECURITY THROUGH A NOVEL THIRD PARTY AUDITOR SCHEME IN CLOUD COMPUTING

被引:0
|
作者
Han, Shuai [1 ]
Xing, Jianchuan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
关键词
cloud computing; third party auditor; data storage; security;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing technology has been looked upon as the next-generation architecture of IT solution. It enables the users to move their data and application software to the network which is different from traditional solutions. Due to this IT services are not under logical, physical and users' controls, it brings many new different security challenges. Ensuring data storage security is one more urgent of them. The representative network architecture for cloud data storage includes a third party auditor which affords trustful authentication for user to operate their data security in cloud. In this paper, we study the problem of data storage security in cloud computing. A novel third party auditor scheme is proposed. The obvious advantage of our scheme is the cloud service provider can offer the functions which were provided by the traditional third party auditor and make it trustful So it indeed reduces the constitution ' s complexity in Cloud Computing.
引用
收藏
页码:264 / +
页数:3
相关论文
共 50 条
  • [41] A Study on Data Storage Security Issues in Cloud Computing
    Vurukonda, Naresh
    Rao, B. Thirumala
    2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 128 - 135
  • [42] Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
    Loheswaran, K.
    Premalatha, J.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 1051 - 1066
  • [43] Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
    K. Loheswaran
    J. Premalatha
    Wireless Personal Communications, 2016, 90 : 1051 - 1066
  • [44] A Novel Data Access Scheme in Cloud Computing
    Gao, Xiaowei
    Jiang, Zemin
    Jiang, Rui
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 124 - 127
  • [45] Improved Verifiability Scheme for Data Storage in Cloud Computing
    YANG Xiaoyuan1
    2.Key Laboratory of Network and Information Security of APF /Engineering College of Armed Police Force
    WuhanUniversityJournalofNaturalSciences, 2011, 16 (05) : 399 - 404
  • [46] Ensuring Privacy in Data Storage as a Service for Educational Institution in Cloud Computing
    Sujana, J. Angela Jennifa
    Revathi, T.
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 96 - 100
  • [47] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing
    Li, Ying
    Du, Liping
    Zhao, Guifen
    Feng, Fuwei
    INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412
  • [48] Three-Step Approach to QoS Maintenance in Cloud Computing Using a Third-Party Auditor
    Rizvi, Syed
    Roddy, Hannah
    Gualdoni, Joseph
    Myzyri, Ilva
    COMPLEX ADAPTIVE SYSTEMS CONFERENCE WITH THEME: ENGINEERING CYBER PHYSICAL SYSTEMS, CAS, 2017, 114 : 83 - 92
  • [49] An Efficient Auditing Scheme for Data Storage Security in Cloud
    Agarkhed, Jayashree
    Ashalatha, R.
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [50] Security and efficiency data sharing scheme for cloud storage
    Han, Ke
    Li, Qingbo
    Deng, Zhongliang
    CHAOS SOLITONS & FRACTALS, 2016, 86 : 107 - 116