Efficient Data Security Method to Control Data in Cloud Storage System using Cryptographic Techniques

被引:0
作者
Prakash, G. L. [1 ]
Prateek, Manish [2 ]
Singh, Inder [2 ]
机构
[1] Univ Petr & Energy Studies, CSE, Dehra Dun, India
[2] Univ Petr & Energy Studies, Ctr IT, Dehra Dun, India
来源
2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE) | 2014年
关键词
Hash Function; Data Storage; Data Control; Verification; Encryption; Data Privacy;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Cloud computing paradigm enables the users toaccess the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data security method using cryptographic techniques. Thus, the proposed method not only encrypts the sensitive data, but also detects the dishonest party to access the data using combined hash functions. We have analyzed the proposed method in terms of storage, communication and computational overheads. The result shows that the proposed security method is more efficient than the existing security system.
引用
收藏
页数:6
相关论文
共 12 条
[1]  
[Anonymous], 2009, CLOUDS BERKELEY VIEW
[2]  
[Anonymous], 2011, SECURITY ARCHITECTUR
[3]  
Barsoum Ayad, 2012, IEEE T PARALLEL DIST
[4]  
Dubey A K, 2012, SOFTW ENG CONSEG CSI, P18
[5]   Improving Security and Efficiency in Attribute-Based Data Sharing [J].
Hur, Junbeom .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) :2271-2282
[6]  
Kuyoro S.O., 2011, INT J COMPUTER NETWO, V3
[7]  
Mohamed E M, 2012, INF SYST INFOS 8 INT, P12
[8]  
Tyagi Sumita, 2010, CRYPTOGRAPHY NETWORK
[9]  
Wang C, 2010, INT CON DISTR COMP S, DOI 10.1109/ICDCS.2010.34
[10]  
Wang C, 2011, IEEE INFOCOM SER, P820, DOI 10.1109/INFCOM.2011.5935305