IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET1522100                                                     

Security Challenges for Public Cloud


Raghavendran R, Parthasarathi L, Deepa N
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
The integrity of data in cloud storage is sub-ject to skepticism and scrutiny, as data stored in the cloud can easily be corrupted due to the inevitable hardware/software fail-ures and human errors. Therefore, the integrity of cloud data should be verified before any data utilization, such as search or computation over cloud data. The traditional approach for checking data correctness is to retrieve the entire data from the cloud, and then verify data integrity by checking the correctness of signatures or hash values of the entire data. Certainly, this conventional approach is able to successfully check the correct-ness of cloud data. However, the efficiency of using this tradition-al approach on cloud data is in doubt. The main reason is that the size of cloud data is large in general. Downloading the entire cloud data to verify data integrity will cost or even waste user amounts of computation and communication resources, especial-ly when data have been corrupted in the cloud.

Raghavendran R, Parthasarathi L, Deepa N

Public Auditing, Privacy-Preserving, Shared data, Cloud Computing


 [1] B. Wang B Li, and H. Li, “Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud” Proc IEEE Fifth Int’l Conf. Cloud Computing pp, 295-302, 2012

[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing" Comm ACM, Vol 53, no. 4, pp. 50,58, April 2010

[3] K. Ren C. Wand abd Q. Wang, "Security Challanges for the Public Cloud" IEEE Internet Computing, Vol. 16, no. 1, pp. 69-73, 2012

[4] F. Song E. Shi, I. Fischer and U. Shankar, "Cloud Data Protection for the Masses", Computer, vol.45, no. 1. 39-45,2012

[5] C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing" Proc. IEEE INFOCOM, pp. 525-533,2010.

[6] B. Wang, M. Li, S.S. Chow, and H. Li, "Computing Encrypted Cloud Data Efficiently under Multiple Keys" Proc. IEEE Conf. Comm. and Network Security(CNS'13), pp. 90-99, 2013

[7] R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems" Comm. ACM, vol.21m no2, pp.120-126,1978

[8] The MD5 Message-Digest Algorithm (RFC1321). https://tools.ieft.org/html/rfc1321,2014

[9] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song "Provable Data Possession at Untrusted Stores" Proc. 14th ACM Conf. Computer and Comm Security (CCS ' 07), pp. 598-610, 2007

[10] H Shacham and B. Waters, "Compact Proofs of Retrivability" Proc. 14th Int'l Conf. THeory and Application of Crytology and Information Security: Advances in Cryptology (ASIACRYPT'08), pp.90-107, 2008.


Publication Details

Published in : Volume 1 | Issue 2 | March-April - 2015
Date of Publication Print ISSN Online ISSN
2015-04-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
311-319 IJSRSET1522100   Technoscience Academy

Cite This Article

Raghavendran R, Parthasarathi L, Deepa N, "Security Challenges for Public Cloud", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.311-319, March-April-2015.
URL : http://ijsrset.com/IJSRSET1522100.php