CFP last date
20 January 2025
Reseach Article

Developing Third Party Auditing Scheme for Secure Cloud Storage Service

by Manasi Doshi, Swapnaja Hiray
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 18
Year of Publication: 2013
Authors: Manasi Doshi, Swapnaja Hiray
10.5120/14220-1903

Manasi Doshi, Swapnaja Hiray . Developing Third Party Auditing Scheme for Secure Cloud Storage Service. International Journal of Computer Applications. 81, 18 ( November 2013), 1-3. DOI=10.5120/14220-1903

@article{ 10.5120/14220-1903,
author = { Manasi Doshi, Swapnaja Hiray },
title = { Developing Third Party Auditing Scheme for Secure Cloud Storage Service },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 18 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number18/14220-1903/ },
doi = { 10.5120/14220-1903 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:56:22.236639+05:30
%A Manasi Doshi
%A Swapnaja Hiray
%T Developing Third Party Auditing Scheme for Secure Cloud Storage Service
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 18
%P 1-3
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is the use of computing of sources that are delivered as a service over a network. Cloud enables users to store their data, but data is stored at remote location. A major characteristic of the cloud services is that user's data are usually processed remotely in unknown machines that users do not operate. So, basic need is to provide security to cloud server. To achieve this, perform flexible distributed storage, utilizing the homomorphism token and distributed erasure-coded data. Also allows for strong cloud storage correctness and simultaneously achieves fast data error localization.

References
  1. C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou "Toward Secure and Dependable Storage Services in Cloud Computing" IEEE transactions on services computing, VOL. 5, NO. 2, APRIL-JUNE 2012
  2. C. Deyan and Z. Hong, "Data Security and Privacy Protection Issues in Cloud Computing," in International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012 pp. 647- 651.
  3. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. 14th European Conf. Research in Computer Security (ESORICS '09), pp. 355-370, 2009.
  4. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy- Preserving Public Auditing for Secure Cloud Storage," IEEE Trans. Computers, preprint, 2012, doi:10. 1109/TC. 2011. 245.
  5. Ryan K L Ko, Peter Jagadpramana, Miranda Mowbray, Siani Pearson, Markus Kirchberg, Qianhui Liang and Bu Sung Lee,"TrustCloud: A Framework for Accountability and Trust in Cloud Computing," 2nd IEEE Cloud Forum for Practitioners (IEEE ICFP 2011), Washington DC, USA,pp 1-8.
  6. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, "Privacy- Preserving Public Auditing for Secure Cloud Storage," IEEE Trans. Computers, preprint, 2012, doi:10. 1109/TC. 2011. 245.
  7. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol 22,no. 5, pp. 847-859, 2011.
  8. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. 14th European Conf. Research in Computer Security (ESORICS '09), pp. 355-370, 2009.
  9. Amazon Cloud, http://aws. amazon. com
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing security distributed storage error localization