Data Confidentiality and Integrity Verification using User Authenticator scheme in cloud

被引:0
作者
Nirmala, V. [1 ]
Sivanandhan, R. K. [1 ]
Lakshmi, R. Shanmuga [1 ]
机构
[1] Govt Coll Technol, Coimbatore, Tamil Nadu, India
来源
2013 IEEE INTERNATIONAL CONFERENCE ON GREEN HIGH PERFORMANCE COMPUTING (ICGHPC) | 2013年
关键词
Cloud computing; cloud securiity; integrity;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is the which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. It offers various services to the client based on the need. The need of the resources can be scaled up or down on the basis of the requirement. The IT sectors started using cloud service models. As the use of cloud increases day by day the concerns of cloud also gets increased. There are number of data breaches that are happening day by day that affect the cloud growth. The major concern in adapting cloud is its security. The companies have lot of data that gets increased each day enlarges the complication of data privacy and security. The data that we talk can be classified as either stagnant data i.e., for simple storage as offered by Amazon's Simple Storage Service (S3) or it can be vibrant that changes often. The solution available to protect the stagnant data will be to simply encrypt the data before it gets stored in the server. In order to solve the issues of vibrant data the techniques are being proposed to work out on the encrypted. This paper is a survey of different security issues that affects the cloud environment and related work that are carried out in the area of integrity. The technique proposed combines the encrypting mechanism along with the data integrity check mechanism. The data are double wrapped to ensure no data leakage happens at the server side. The data are also shared with users with proper access mechanism.
引用
收藏
页数:5
相关论文
共 13 条
  • [1] Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [4] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [5] MR-PDP: Multiple-Replica Provable Data Possession
    Curtmola, Reza
    Khan, Osama
    Burns, Randal
    Ateniese, Giuseppe
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 411 - +
  • [6] ERWAY C, 2009, P CCS 09
  • [7] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
  • [8] Nirmala V., 2013, IJCA INT C COMM COMP, P24
  • [9] Shacham H, 2008, LECT NOTES COMPUT SC, V5350, P90, DOI 10.1007/978-3-540-89255-7_7
  • [10] SHAH M, 2007, P HOTOS 11 US