Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES algorithm

被引:13
作者
Shimbre, Nivedita [1 ]
Deshpande, Priya [1 ]
机构
[1] Coll Engn, Dept Informat Technol, Pune, Maharashtra, India
来源
1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015 | 2015年
关键词
Cloud security; Hash code; Encryption; CSP and TPA;
D O I
10.1109/ICCUBEA.2015.16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing model is very exciting model especially for business peoples. Many business peoples are getting attracted towards cloud computing model because of the features easy to manage, device independent, location independent. But this cloud models comes with many security issues. A business person keeps crucial information on cloud, so security of data is crucial issue as probability of hacking and unauthorised access is there. Also availability is a major concern on cloud. This paper, discusses the file distribution and SHA-1 technique. When file is distributed then data is also segregated into many servers. So here the need of data security arises. Every block of file contains its own hash code, using hash code which will enhance user authentication process; only authorized person can access the data. Here, the data is encrypted using advanced encryption standard, so data is successfully and securely stored on cloud. Third party auditor is used for public auditing. This paper discusses the handling of some security issues like Fast error localization, data integrity, data security. The proposed design allows users to audit the data with lightweight communication and computation cost. Analysis shows that proposed system is highly efficient against malicious data modification attack and server colluding attack. Performance and extensive security analysis shows that proposed systems are provably secure and highly efficient.
引用
收藏
页码:35 / 39
页数:5
相关论文
共 25 条
[1]  
[Anonymous], 2009, BUILD CUST TRUST CLO
[2]  
[Anonymous], 2012, VSRD IJCSIT
[3]  
[Anonymous], INTEGRITY CHECKING C
[4]  
[Anonymous], IEEE INT C SERV COMP
[5]  
Ateniese G., 2008, P 4 EAI SECURECOMM, P1, DOI 10.1145/1460877.1460889
[6]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[7]  
Dodis Y., 2009, P 6 THEOR CRYPT C TC
[8]  
Gadicha2 V.B., 2014, INT J APPL INNOVATIO, V3
[9]  
Hwang Jing-Jang, 2011, P 2011 INT C INF SCI
[10]  
Itkar Suhasini, 2014, INTERNATIONAL JOURNA, V1