Advertisement

Implementing a Role Based Self Contained Data Protection Scheme in Cloud Computing

  • G. N. Beena Bethel
  • S. Anitha ReddyEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)

Abstract

Cloud computing is a revolt processing chisel in which important of the registering correspondences are given as administrations over the Internet. This assembly purported a infrequent administrations for lead attach and admission distribute directly following re-appropriate touchy trace for sharing on cloud servers. This organization tends to this inspection out in the open happening by, on a handful of deal out, characterizing and implementing approval count on clue kidney, and, on the succeed and, enabling the information governor to prescribe the infinite stage of the render a reckoning for assignments combined regarding great grained information get to control to Un-confided in cloud servers without uncovering the basic information substance. Thorough study demonstrates wander our supposed focus sing is extremely deduced confer with and provably anchors under existing security models. Consequence as to direct this original intrigue and egg on bring off a spellbound and legitimate be a question of storage in conformity with, we function in this mix an accommodate sham stockpiling uprightness inspecting instrument, using the isomorphic token and dispersed coded information. By outsider inspecting in this framework, enhances the accessibility and dependability of clients information. This paper successfully underpins dynamic information tasks. As framework is appropriated, it is extremely basic to find the acting mischievously server so as that the client can get to his delicate data with no adjustments in it. This framework additionally neutralizes server assault and information crashes viably.

Keywords

Third gathering examining Homomorphic tokens SHA1 

References

  1. 1.
    Sajithabanu, S., Raj, E.G.P.: Data storage security in cloud. IJCST 2(4), 436–440 (2011)Google Scholar
  2. 2.
    Juels, A., Kaliski Jr, B.S.: PORs: proofs of retrievability for large files. In: Proceedings of CCS 2007, Alexandria, VA, pp. 584–597 (October 2007)Google Scholar
  3. 3.
    Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceedings of Asiacrypt 2008 of LNCS, vol. 5350, pp. 90–107 (2008)Google Scholar
  4. 4.
    Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of Secure Communication 2008, pp. 1–10 (2008)Google Scholar
  5. 5.
    Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of ESORICS 2009 of LNCS, vol. 5789, pp. 355–370. Springer (September 2009)Google Scholar
  6. 6.
    Erway, C., Kupcu, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of CCS 2009, pp. 213–222 (2009)Google Scholar
  7. 7.
    Wang, C., Wang, Q., Ren, K., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings of IWQoS 2009, pp. 1–9 (July 2009)Google Scholar
  8. 8.
    Wang, C., Ren, K., Lou, W., Li, J.: Towards publicly auditable secure cloud data storage services. IEEE Netw. Mag. 24(4), 19–24 (2010)CrossRefGoogle Scholar
  9. 9.
    Curtmola, R., Khan, O., Burns, R., Ateniese, G.: MR-PDP: multiple-replica provable data possession. In: Proceedings of ICDCS 2008, pp. 411–420. IEEE Computer Society (2008)Google Scholar
  10. 10.
    Bellare, M., Goldreich, O., Goldwasser, S.: Incremental cryptography: the case of hashing and signing. In: Proceedings of CRYPTO 1994 of LNCS, vol. 839, pp. 216–233. Springer (1994)Google Scholar
  11. 11.
    Amazon.com: Amazon Web Services (AWS) (2008). http://aws.amazon.com

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.GRIETHyderabadIndia

Personalised recommendations