An Enhanced Data Owner Centric Model for Ensuring Data Security in Cloud

被引:5
作者
Bajwa, Maninder Singh [1 ]
Himani [1 ]
Kang, Sandeep Singh [1 ]
机构
[1] Global Inst Management & Emerging Technol, Dept Comp Sci & Engn, Amritsar, Punjab, India
来源
2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015 | 2015年
关键词
cloud Computing; Data Security; Encryption; Obfuscation; HMAC;
D O I
10.1109/ICACCE.2015.36
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has broad excitement in the latest trend in computing. It has multi-fold benefits, which attract IT sector as well as individual to adopt it but there are some issues which degrade the user services. The Major issues are data security, data leakage, data privacy, data confidentiality and integrity. Due to which users are not able to fearlessly upload their data to cloud. To solve this problem we proposed a model which is highly secure and is based on data owner centric model i.e. data is under control of data owner. Encryption, Obfuscation, HMAC and Dual authentication and access management technique has been used which make the proposed model more reliable and effective to use it in real world.
引用
收藏
页码:500 / 503
页数:4
相关论文
共 15 条
  • [1] SeDaSC: Secure Data Sharing in Clouds
    Ali, Mazhar
    Dhamotharan, Revathi
    Khan, Eraj
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Li, Keqin
    Zomaya, Albert Y.
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 395 - 404
  • [2] [Anonymous], INT C TRUST SEC PRIV
  • [3] [Anonymous], INTEGRITY CHECKING C
  • [4] Arockiam L, 2014, INT CONF COMP COMMUN
  • [5] Cheng Fred, 2011, SECURITY ATTACK SAFE
  • [6] Cindhamani J, 2014, 5 ICCCNT 2014 JUL 11
  • [7] Huang Kuan-Ying, 2012, INT C ONGENETIC EV C
  • [8] Hwang Jing-Jang, ABUSINESS MODEL CLOU
  • [9] Jiang Tao, 2015, PUBLIC INTEGRITY AUD
  • [10] Mohamed E.M., 2012, 8 INT C INFORMATICS, pCC