CFP last date
20 December 2024
Reseach Article

A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage

Published on February 2015 by S. Arul Oli, L. Arockiam
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 5
February 2015
Authors: S. Arul Oli, L. Arockiam
6e4a4413-668c-4783-b1d3-c21b283fdf3a

S. Arul Oli, L. Arockiam . A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 5 (February 2015), 1-5.

@article{
author = { S. Arul Oli, L. Arockiam },
title = { A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 5 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icaccthpa2014/number5/19460-6049/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A S. Arul Oli
%A L. Arockiam
%T A Novel Approach for Ensuring Data Confidentiality in Public Cloud Storage
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 5
%P 1-5
%D 2015
%I International Journal of Computer Applications
Abstract

Cloud computing is one of the emerging forms of modern computing due to its many advantages. The security in the cloud data storage has become an important aspect of quality of service. As the number of users is on the tremendous increase, there arise many more issues since users look for the space to store sensitive data in the cloud. Along with variant advantages, the cloud storage has gained lot more advancement in both IT firms and Education fields since 2007. However, it also poses new challenges in creating secure and reliable data storage. Cloud delivers a facility for easy access over insecure or unreliable service providers. This paper addresses the security issues of storing sensitive data in a cloud storage service and this provides the need for the users to store the data in the trusted cloud providers. This proposes a cryptographic technique for cloud storage with encryption and decryption techniques. A novel approach is proposed for security in cloud storage. We also further look for the scheme which would check the integrity of their data and to optimize the mechanism efficiently and effectively.

References
  1. DoD Trusted Computer System Evaluation Criteria, http: /csrc. nist. gov/publications/history/dod85. pdf
  2. Kamara and K. Lauter, "Cryptographic cloud storage," in Proceedings of the 14th international conference on Financial cryptography and data security, ser. FC'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 136–149.
  3. R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proceedingsof the 2009 ACM workshop on Cloud computing security. ACM, 2009, pp. 85–90.
  4. Varun Maheshwari, et al, "Character-based Search with Data Confidentiality in the Clouds", IEEE, 2012.
  5. Krishna P. N. Puttaswamy, et al. , "Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications", SOCC, 2011.
  6. Tribhuwan, M. R. , V. A. Bhuyar, and Shabana Pirzade. "Ensuring data storage security in cloud computing through two-way handshake based on token management. " Advances in Recent Technologies in Communication and Computing (ARTCom), 2010 International Conference on. IEEE, 2010.
  7. Sato, Kanai Atsushi, and Tanimoto Shigeaki. "Building a security aware cloud by extending internal control to cloud. " Autonomous Decentralized Systems (ISADS), 2011 10th International Symposium on. IEEE, 2011. Sato et al.
  8. Seung-Hyun Seo, et al. , "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds", IEEE, 2013.
  9. Jeong-Min do, "Attribute based Proxy Re-Encryption for Data Confidentiality in Cloud Computing Environments", IEEE, 2011.
  10. Shuai Han, "Ensuring Data Storage Security through a Novel Third Party Auditor Scheme in Cloud Computing", IEEE, 2011.
  11. Abhishek, R. M. Tugnayat, and A. K. Tiwari. "Data Security Framework for Cloud Computing Networks" International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, ISSN 0976– 6375 (Online), pp. 178-181.
  12. Arockiam, L. , S. Monikandan, and P. D. Malarchelvi. "Obfuscrypt: A Novel Confidentiality Technique for Cloud Storage. " International Journal of Computer Applications 88 (2014).
  13. Monikandan, L. Arockiam, "Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm. " International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) 2. 8 (2013): 2278-1021.
  14. Nesrine Kaaniche, Aymen boudguiga, Maryline Laurent, "ID-Based Cryptography for Secure Cloud Data Storage, IEEE Sixth International Conference on Cloud Computing, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Key Generation System Security Confidentiality