We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Cloud Data Security using Auditing Scheme

by Anuj Kumar Yadav, M. L. Garg, Ritika
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 8
Year of Publication: 2016
Authors: Anuj Kumar Yadav, M. L. Garg, Ritika
10.5120/ijca2016912483

Anuj Kumar Yadav, M. L. Garg, Ritika . Cloud Data Security using Auditing Scheme. International Journal of Computer Applications. 156, 8 ( Dec 2016), 10-15. DOI=10.5120/ijca2016912483

@article{ 10.5120/ijca2016912483,
author = { Anuj Kumar Yadav, M. L. Garg, Ritika },
title = { Cloud Data Security using Auditing Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 8 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number8/26728-2016912483/ },
doi = { 10.5120/ijca2016912483 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:02.567394+05:30
%A Anuj Kumar Yadav
%A M. L. Garg
%A Ritika
%T Cloud Data Security using Auditing Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 8
%P 10-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has emerged as one of the latest computing paradigm and is a growing technology for upcoming years. According to NIST Cloud computing is a model for convenient, on-demand network access to a large pool of computing resources. Resource can be hardware or software resource and this pool of resources can be rapidly provisioned and released with minimum management effort or cloud service provider interaction [1]. In Cloud computing, different types of data and program can be stored at different locations, the cloud data centers and can be accessed whenever required, from anywhere, via different type of devices having internet connection. Due to this method of storing user’s data at cloud provider’s end, users gets numerous benefits such as, access flexibility, large storage capability, and resilience. In Cloud computing vendor supplies the hardware infrastructure, and the software interacts with the user through a front-end portal [2][3]. One of the service provided by the Cloud computing is Cloud storage, in which user information and data is stored, managed, backed up on multiple locations as a replica and made available to users via interconnection network. Apart from all benefits and advantages there are some concerns as well related to cloud computing, as in cloud computing data is put outside the control of the end user on a location that is unknown to the user. Due to this, Cloud computing also raises to various security issues. [4] End user is concerned about the integrity of data that is stored in cloud, as user’s data can be modified by attackers or even in some cases due to employee espionage. The cloud server is just used to save the encrypted blocks of data for the user. By using the auditing approach processing overhead of cloud server and verifying authority can be largely reduced. Cryptography is an effective technique that helps to assure user’s data accuracy. The Cryptographic techniques can be used in cloud to protect the data from attackers. In this paper, the significance of cryptography is discussed by which possibility of attacks on cloud data can be reduced. This paper covers some of the existing cryptographic methods that ensure the security of cloud data. In this paper auditing scheme is presented using cryptographic techniques and by using the auditing scheme based on the cryptography user data becomes more secure, that leads to enhancement of trust between the end user and cloud provider. Cloud data auditing is necessary for securing data in cloud storage since it facilitates cloud users to verify the integrity of their outsourced data effectively and efficiently.

References
  1. Mell, Peter, and Timothy Grance. "The NIST definition of cloud computing (draft).", NIST special publication 800.145 (2011).
  2. Zhang, L.-J., Zhou, " CCOA: cloud computing open architecture.",In: 2009 IEEE International Conference on Web Services (2009), pp. 607–616.
  3. Ye Du , Ruhui Zhang , Meihong L, "Research on a security mechanism for cloud computing basedon virtualization”, Springer Science+Business Media New York (2013) ,pp 19-24.
  4. Mark D. Ryan, " Cloud computing security: The scientific challenge, and a survey of solutions”, Elsevier, The journal of system and software ( 2013) ,pp 2263-2268.
  5. Lifei Wei, Haojin Zhu,, Zhenfu Cao,, Xiaolei Dong,, Weiwei Jia, Athanasios V. Vasilakos,” Security and privacy for storage and computation in cloud computing “, Elsevier,Information Sciences (2014) ,pp 371-386.
  6. An Na Kang , Leonard Barolli ,Jong Hyuk Park ,Young-Sik Jeon,” A strengthening plan for enterprise information security based on cloud computing “,Springer Science+Business Media (2013) ,pp 703-710.
  7. Cindhamani.J, Naguboynia Punya, Rasha Ealaruvi, L.D. Dhinesh babu ,” An enhanced data security and trust management enabled framework for cloud computing systems”, 5th ICCCNT – 2014 July 11-13, 2014, Hefei, China, IEEE(2014)
  8. Kaiping Xue, Peilin Hong ,” A Dynamic Secure Group Sharing Framework in Public Cloud Computing” , IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 4, OCTOBER DECEMBER (2014) ,pp 459-470. 11
  9. Meng Liu, Wanchun Dou, Shui Yu, Zhensheng Zhang, “A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 26, NO. 3, MARCH (2015),pp 621-631.
  10. M.Armbrust,A.Fox,R.Griffith,A.D.Joseph,R.Katz,A.Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “A view of cloud computing,” Commun. ACM (2010), vol. 53, no. 4, pp. 50–58.
  11. C. Hoff.,” Cloud computing security: From ddos attack (distributed denial of service) to edos (economic denial of sustainability)” [Online]. Available: http://www.rationalsurvivability.com/blog/?p=66(2008)
  12. Nektarios Georgios Tsoutsos, , Michail Maniatakos, “The HEROIC Framework: Encrypted Computation Without Shared Keys”, IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 34, NO. 6, JUNE (2015),pp 875-888.
  13. IBM Security Solutions, “2010 Mid-year trend and risk report,”.http://www-05.ibm.com/fr/pdf/IBM_X-Force2010_Mid-Year_Trend_and_Risk_Report.pdf (Aug. 2010).
  14. KPMG’s 2010 Cloud Computing survey. http://www.techrepublic.com/whitepapers/fromhype- to-futurekpmgs-2010-cloud-computing- survey/2384291.
  15. Jin He , Mianxiong Dong , Kaoru Ota , Minyu Fan Guangwei Wang,” NetSecCC: A scalable and fault- tolerant architecture for cloud computing security”, Springer Science+Business Media New York,(2014).
  16. Rajkumar Buyya ,”Introduction to the IEEE Transactions on Cloud Computing”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 1, NO. 1, JANUARY-JUNE (2013),pp 3-21.
  17. Yong yu,Liang Xue,Man Ho Au,Willy Susilo, Jianbing Ni,Yafang Zhang,Athanasios V. Vasilakos,Jian Shen,” Cloud data integrity checking with an identity-based auditing mechanism from RSA”, Elsevier, Future generation Computing systems (2016) .
  18. M. Xie, H. Wang, J. Yin, X. Meng, “Integrity auditing of outsourced data, in: Proceeding of VLDB’07”, University of Vienna, Austria, (2007), pp. 782–793.
  19. Zissis, Dimitrios, Dimitrios Lekkas” Addressing cloud computing security issues”, Future Generation computer systems ,March (2012),pp. 583-592.
  20. Swapnali More,Sangita Chaudhari,” Third Party Public Auditing scheme for Cloud Storage”, 7th International Conference on Communication, Computing and Virtualization, Procedia Computer Science ,2016 , pp 69 – 76.
  21. Cong Wang, Member, Sherman S.M. Chow, Qian Wang, Kui Ren, Wenjing Lou, “Privacy Preserving Public Auditing for Secure Cloud Storage”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2, FEBRUARY (2013).
  22. Cong Wang, Sherman SM Chow, Qian Wang, Kui Ren, and Wenjing Lou. Privacy Preserving Public Auditing for Secure Cloud Storage. http://eprint.iacr.org/2009/579.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Server IaaS PaaS SaaS TPA .